Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe

Overview

General Information

Sample name:3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
Analysis ID:1585454
MD5:46441da6848047284fdd6a2dfa19b802
SHA1:bbafc91be5b5c0a1248aac8e485aea1a7a4fa03c
SHA256:3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69bf765371529aa07db9f
Tags:AsyncRATexeRATuser-abuse_ch
Infos:

Detection

AsyncRAT, GhostRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected AsyncRAT
Yara detected GhostRat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara signature match

Classification

  • System is w10x64
  • 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe (PID: 800 cmdline: "C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe" MD5: 46441DA6848047284FDD6A2DFA19B802)
    • MSBuild.exe (PID: 4044 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • wscript.exe (PID: 5660 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • smcdll.exe (PID: 3540 cmdline: "C:\Users\user\AppData\Local\smcdll.exe" MD5: 46441DA6848047284FDD6A2DFA19B802)
      • MSBuild.exe (PID: 3196 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "jojo.ath.cx", "Ports": "1414", "Version": "| Edit 3LOSH RAT", "Autorun": "false", "Install_Folder": "%AppData%", "Install_File": "dllscv.exe", "AES_key": "T7Adi3Jnc86CP1KVXUt4k5Ebe2ZotBR8", "Mutex": "AsyncMutex_7SI8OkPne", "AntiDetection": "false", "External_config_on_Pastebin": "true", "BDOS": "null", "Startup_Delay": "3", "HWID": "5zRQrDk3l4mK49bqUziDHYRSafIDSxULFM3MJpBh4NKDtFEtDZm5OzdaX9AWgiEEVCaE0wXxVFJ/gEJ5eIKwQg==", "Certificate": "MIIE8jCCAtqgAwIBAgIQAPeWQ4YJ3MvReCGwLzn7rTANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjIwNDI1MDA0MTA5WhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKT9nYYTjYTZhY+g1tekZ8/F29gsEIDgf/8odvCbCmYKGGZZi2yND9NjtBXEMANM9PAXCyMapGvapDPbWgjYkLiMw/Vwa3kZRg7kLpXMpzInLQufe7Q587viilcsGDoVXmnf51/SwsKPjSysZUpyayezUlJ1j6aXkZGnasiqJ7iKANdSneQducOn6IwaEuJBmpXKWxhhq8R9JMfiWeOXL/hXoE/wCzwzvU/CrzPXd3uMsLfFMDHZJ+OQ9OXKU/CHZNCgSPs4VSgCgM4eK0YTbu1mLsWSo5th3/ingNFaTyYmGsmLIE2Jq5AR1A+xA+FEdC8zKL1bAwYQcRgIJs7QdedtAIufepPZ9D5HiOiy3ITYVonqwTiiIm20en7UICt+J8iDb4M2Q2iLWA7Yi9PN2cr0Xrs8A4/RL29Qe5Ly2k35i74RiBTiT7Jbl2r7PcYlUGcjTCbdB9PWt3dYaTysuamoq2Zuo2HVRhhoZpwnajS9vNcjuZCYVoQvUQBUnHTeRZrtHXU5JV59ZBlu7flZneMZnbrWXTxob6Bdt8+hrGoSDMWBFcO4jRzhT3hEFUpu4lSFeb9T3Vx4KWkHJhHtMvHuYgDTXERdEcI00sOUbVxgd/62LhGXNNommQKCyiAGj0V5uLD73Fyw8vJpm3jXf3NgNt/CjnlaMc40DJ+HlXE5AgMBAAGjMjAwMB0GA1UdDgQWBBQsT2WvtxGUK29SWs4sHz1xYye0fzAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQCK5sVfnYyT5MqnCg3uHV2ojf12fIVFCY02Cc7gy3DVoE6/xZCPjr22V/xZunZ7DG1nt0kOJKDwdQYnGoMc5UPh8jbNRoc1ojLOCaluaIYQyl8AGkmUSRA3Ltk0XetDescffrWT/nKuRvIEYU4Ra+B39f8ouGMCa7VXaxnGJ0z0BkUie8KsDLgNmJ7/kVfIYuRxl+YefoCsUTCogqf0fu3DuRHBpUVaSQQOf9YCbvFWH7Nupc3UIwpH5D8kSdpKusEfbRp8nfWN/Fm+lzF3THeHU6vNJ+5UoAWHYFW8wfJCbzQ/0L8QZeOv4uy74oQP2Ed0RdrWCwUL6SSsDPZdDEOy4K4vVYkDTl1nL5tleATguELAEbbT42oLce85z4C7sKvpEfa4DPbU55xBLwvHniILFfjB7VVsrgVckUL/lEf4Y92uJVKvLGruQt/mtKSqIuJjD8T9y7RIsk6g9624egV5UtLtv+36kLKhgIJlqC7Xx/PVwMc2yw8BiQlvxQZgqSd1k7QmV1AhV/3z2wqnYmb09ibTMYaMFjtamFegeFqc4jRLABhVQFEFv8z5E6G9vgKn5mQDWS/JykARBv9o2BjL/PTADfwAtc1b4nWo0l+CI8IjjYXu/mJOuwR+kFJ19INtwbffQvT9U12t4smpcZV+OK0opk4Yr9r1tZYm92ghXA==", "ServerSignature": "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", "Group": "Domain"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
    • 0xc3d4:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    00000000.00000002.2142524766.0000000004336000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000000.00000002.2145295489.0000000005E30000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000004.00000002.2285668016.0000000004583000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
          Click to see the 25 entries
          SourceRuleDescriptionAuthorStrings
          4.2.smcdll.exe.45e88a8.5.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5e30000.6.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              4.2.smcdll.exe.45e88a8.5.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5e30000.6.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  4.2.smcdll.exe.45a8888.2.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    Click to see the 24 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs" , ProcessId: 5660, ProcessName: wscript.exe
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs" , ProcessId: 5660, ProcessName: wscript.exe

                    Data Obfuscation

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, ProcessId: 800, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-07T17:12:10.094663+010020355951Domain Observed Used for C2 Detected157.20.182.161414192.168.2.649710TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-07T17:12:10.094663+010020356071Domain Observed Used for C2 Detected157.20.182.161414192.168.2.649710TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-07T17:12:10.094663+010028424781Malware Command and Control Activity Detected157.20.182.161414192.168.2.649710TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: jojo.ath.cxAvira URL Cloud: Label: malware
                    Source: 00000004.00000002.2272656932.0000000003A79000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "jojo.ath.cx", "Ports": "1414", "Version": "| Edit 3LOSH RAT", "Autorun": "false", "Install_Folder": "%AppData%", "Install_File": "dllscv.exe", "AES_key": "T7Adi3Jnc86CP1KVXUt4k5Ebe2ZotBR8", "Mutex": "AsyncMutex_7SI8OkPne", "AntiDetection": "false", "External_config_on_Pastebin": "true", "BDOS": "null", "Startup_Delay": "3", "HWID": "5zRQrDk3l4mK49bqUziDHYRSafIDSxULFM3MJpBh4NKDtFEtDZm5OzdaX9AWgiEEVCaE0wXxVFJ/gEJ5eIKwQg==", "Certificate": "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", "ServerSignature": "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", "Group": "Domain"}
                    Source: C:\Users\user\AppData\Local\smcdll.exeReversingLabs: Detection: 57%
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeReversingLabs: Detection: 57%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\AppData\Local\smcdll.exeJoe Sandbox ML: detected
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeJoe Sandbox ML: detected
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49782 version: TLS 1.0
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145705636.0000000005F30000.00000004.08000000.00040000.00000000.sdmp, 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2142524766.0000000004161000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2285668016.00000000044D3000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2285668016.00000000044D5000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145705636.0000000005F30000.00000004.08000000.00040000.00000000.sdmp, 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2142524766.0000000004161000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2285668016.00000000044D3000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2285668016.00000000044D5000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 4x nop then jmp 05C91463h0_2_05C913D0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 4x nop then jmp 05C91463h0_2_05C913E0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 4x nop then jmp 05C9103Dh0_2_05C90C48
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 4x nop then jmp 05C9103Dh0_2_05C90C38
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 4x nop then jmp 05C93998h0_2_05C93899
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 4x nop then jmp 05C93998h0_2_05C938A8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 4x nop then jmp 05C93998h0_2_05C93BAC
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 4x nop then jmp 05C93998h0_2_05C93B3F
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_05CCD4D8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 4x nop then jmp 05EA8BD0h0_2_05EA8B18
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 4x nop then jmp 05EA8BD0h0_2_05EA8B11
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4x nop then jmp 05F01463h4_2_05F013E0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4x nop then jmp 05F01463h4_2_05F013D0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4x nop then jmp 05F0103Dh4_2_05F00C48
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4x nop then jmp 05F0103Dh4_2_05F00C38
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4x nop then jmp 05F03998h4_2_05F038A8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4x nop then jmp 05F03998h4_2_05F03899
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4x nop then jmp 05F03998h4_2_05F03BAC
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4x nop then jmp 05F03998h4_2_05F03B3F
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h4_2_05F3D4D8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4x nop then jmp 06207058h4_2_06206FA0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4x nop then jmp 06207058h4_2_06206F98

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 157.20.182.16:1414 -> 192.168.2.6:49710
                    Source: Network trafficSuricata IDS: 2030673 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 157.20.182.16:1414 -> 192.168.2.6:49710
                    Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 157.20.182.16:1414 -> 192.168.2.6:49710
                    Source: Network trafficSuricata IDS: 2035607 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 157.20.182.16:1414 -> 192.168.2.6:49710
                    Source: Malware configuration extractorURLs: jojo.ath.cx
                    Source: Yara matchFile source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.35a3ca4.0.raw.unpack, type: UNPACKEDPE
                    Source: global trafficTCP traffic: 192.168.2.6:49710 -> 157.20.182.16:1414
                    Source: Joe Sandbox ViewASN Name: FCNUniversityPublicCorporationOsakaJP FCNUniversityPublicCorporationOsakaJP
                    Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                    Source: unknownHTTPS traffic detected: 173.222.162.64:443 -> 192.168.2.6:49782 version: TLS 1.0
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
                    Source: unknownTCP traffic detected without corresponding DNS query: 20.190.159.23
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: jojo.ath.cx
                    Source: MSBuild.exe, 00000002.00000002.4579287334.0000000000D59000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
                    Source: 77EC63BDA74BD0D0E0426DC8F80085060.2.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                    Source: MSBuild.exe, 00000002.00000002.4600428550.00000000052B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab%
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4590412855.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: Yara matchFile source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.35a3ca4.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.35a3ca4.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4590412855.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128611429.00000000032FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2272656932.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe PID: 800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: smcdll.exe PID: 3540, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 3196, type: MEMORYSTR
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, LimeLogger.cs.Net Code: KeyboardLayout

                    System Summary

                    barindex
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 4.2.smcdll.exe.35a3ca4.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: 4.2.smcdll.exe.35a3ca4.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                    Source: 4.2.smcdll.exe.35a3ca4.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                    Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 4.2.smcdll.exe.35a3ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: 4.2.smcdll.exe.35a3ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
                    Source: 4.2.smcdll.exe.35a3ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 00000000.00000002.2128611429.00000000032FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 00000004.00000002.2272656932.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
                    Source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: Process Memory Space: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe PID: 800, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: Process Memory Space: smcdll.exe PID: 3540, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: Process Memory Space: MSBuild.exe PID: 3196, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
                    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05EAA4A8 NtProtectVirtualMemory,0_2_05EAA4A8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05EAD9B8 NtResumeThread,0_2_05EAD9B8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05EAA4A0 NtProtectVirtualMemory,0_2_05EAA4A0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05EAD9B0 NtResumeThread,0_2_05EAD9B0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0620BE40 NtResumeThread,4_2_0620BE40
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06208D38 NtProtectVirtualMemory,4_2_06208D38
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0620BE39 NtResumeThread,4_2_0620BE39
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06208D31 NtProtectVirtualMemory,4_2_06208D31
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_030D67480_2_030D6748
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_030DA7580_2_030DA758
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_030D3EF00_2_030D3EF0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_030D70D90_2_030D70D9
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_030D70E80_2_030D70E8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_030D67380_2_030D6738
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BB29500_2_05BB2950
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BB28F80_2_05BB28F8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BE33600_2_05BE3360
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BE15F80_2_05BE15F8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BE15E80_2_05BE15E8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BEAD300_2_05BEAD30
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BEAD210_2_05BEAD21
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BEF1D00_2_05BEF1D0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BEE9620_2_05BEE962
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BEE95F0_2_05BEE95F
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BEE8300_2_05BEE830
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BEE8500_2_05BEE850
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BEB3F80_2_05BEB3F8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BE33370_2_05BE3337
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BE4AED0_2_05BE4AED
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05C9F5510_2_05C9F551
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05C9D1700_2_05C9D170
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05C9B3D80_2_05C9B3D8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05C9F5A00_2_05C9F5A0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05C9F5B00_2_05C9F5B0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05C9D1600_2_05C9D160
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05C9B3C80_2_05C9B3C8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05CBDBF80_2_05CBDBF8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05CC00400_2_05CC0040
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05CC00070_2_05CC0007
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05CCF2E80_2_05CCF2E8
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E161B20_2_05E161B2
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E1A1250_2_05E1A125
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E15F350_2_05E15F35
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E15ED20_2_05E15ED2
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E1D9500_2_05E1D950
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E178480_2_05E17848
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E19A100_2_05E19A10
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E164730_2_05E16473
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E1A7580_2_05E1A758
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E1A6930_2_05E1A693
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E1614A0_2_05E1614A
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E100400_2_05E10040
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E100070_2_05E10007
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E1DC770_2_05E1DC77
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E15FF40_2_05E15FF4
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E15FC50_2_05E15FC5
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E15F910_2_05E15F91
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E1EF4B0_2_05E1EF4B
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E15E420_2_05E15E42
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E15E500_2_05E15E50
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E178380_2_05E17838
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E10AC40_2_05E10AC4
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E19A030_2_05E19A03
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E2BBD00_2_05E2BBD0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E2F3900_2_05E2F390
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E27A580_2_05E27A58
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E2A2580_2_05E2A258
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E299E00_2_05E299E0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E299F00_2_05E299F0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E285280_2_05E28528
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E285180_2_05E28518
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E200400_2_05E20040
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E200160_2_05E20016
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E2A2F20_2_05E2A2F2
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E27A490_2_05E27A49
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05EA6B280_2_05EA6B28
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05EA1AD00_2_05EA1AD0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05EA6B180_2_05EA6B18
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05EA1AC00_2_05EA1AC0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_060BF9A00_2_060BF9A0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_060A00060_2_060A0006
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_060A00400_2_060A0040
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_060BE8E80_2_060BE8E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 2_2_0104E0482_2_0104E048
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_01B1A7584_2_01B1A758
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_01B167484_2_01B16748
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_01B13ED04_2_01B13ED0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_01B170E84_2_01B170E8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_01B167384_2_01B16738
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_01B1A7494_2_01B1A749
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E533604_2_05E53360
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E515E84_2_05E515E8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E515F84_2_05E515F8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E5AD214_2_05E5AD21
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E5AD304_2_05E5AD30
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E5F1D04_2_05E5F1D0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E5E9624_2_05E5E962
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E5E95F4_2_05E5E95F
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E5E8504_2_05E5E850
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E5E8304_2_05E5E830
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E5B3F84_2_05E5B3F8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E533374_2_05E53337
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E54AED4_2_05E54AED
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05F0C8B84_2_05F0C8B8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05F0C8B14_2_05F0C8B1
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05F2DBF84_2_05F2DBF8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05F213A84_2_05F213A8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05F300404_2_05F30040
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05F300064_2_05F30006
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05F3F2E84_2_05F3F2E8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0608A1254_2_0608A125
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060861B24_2_060861B2
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06085ED24_2_06085ED2
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06085F354_2_06085F35
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06080AC44_2_06080AC4
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060878484_2_06087848
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0608D9504_2_0608D950
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0608A6924_2_0608A692
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0608A7584_2_0608A758
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060864734_2_06086473
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060800074_2_06080007
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060800404_2_06080040
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0608614A4_2_0608614A
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06085E404_2_06085E40
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06085E504_2_06085E50
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0608EF4A4_2_0608EF4A
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06085F914_2_06085F91
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06085FC54_2_06085FC5
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06085FF44_2_06085FF4
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0608DC774_2_0608DC77
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06089A014_2_06089A01
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06089A104_2_06089A10
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060878384_2_06087838
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06097A584_2_06097A58
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0609A2584_2_0609A258
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0609F3904_2_0609F390
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0609BBD04_2_0609BBD0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060985184_2_06098518
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060985284_2_06098528
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06097A494_2_06097A49
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0609A2F24_2_0609A2F2
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0609001F4_2_0609001F
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060900404_2_06090040
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060999E04_2_060999E0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060999F04_2_060999F0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_062023104_2_06202310
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_062053B84_2_062053B8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_062042A04_2_062042A0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_062042924_2_06204292
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_062023004_2_06202300
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_062053A84_2_062053A8
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_062079F04_2_062079F0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0632F9A04_2_0632F9A0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_063100074_2_06310007
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_063100404_2_06310040
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0632E8E84_2_0632E8E8
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145705636.0000000005F30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2128611429.0000000003391000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStub.exe" vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2142524766.0000000004336000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUtcew.dll" vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2142524766.0000000004161000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2142524766.0000000004161000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWpmutnro.exe4 vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2127822559.000000000147E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStub.exe" vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2143515763.0000000005940000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameUtcew.dll" vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000000.2117861292.0000000000D92000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWpmutnro.exe4 vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeBinary or memory string: OriginalFilenameWpmutnro.exe4 vs 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 4.2.smcdll.exe.35a3ca4.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: 4.2.smcdll.exe.35a3ca4.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                    Source: 4.2.smcdll.exe.35a3ca4.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                    Source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 4.2.smcdll.exe.35a3ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: 4.2.smcdll.exe.35a3ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
                    Source: 4.2.smcdll.exe.35a3ca4.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 00000000.00000002.2128611429.00000000032FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 00000004.00000002.2272656932.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
                    Source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: Process Memory Space: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe PID: 800, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: Process Memory Space: smcdll.exe PID: 3540, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: Process Memory Space: MSBuild.exe PID: 3196, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: smcdll.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, -.csCryptographic APIs: 'CreateDecryptor'
                    Source: smcdll.exe.0.dr, -.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.41b3d90.2.raw.unpack, -.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.4165570.1.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.4165570.1.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, -.csBase64 encoded string: 'Kl3pcajKV3b/Y6HCGlDzaqOJOFfpYKDFFV2hQqjTPErud7TmClf/aK/LAB/9YLn4P1H2aYPGFEGhar34MEr/dLjGFU3ufPbAHFDFSajJHlDyPorCDXDjdajhC0v3TazJHUj/PqrCDXvUZKDCQm30YajfNkKhV6jGHXfud6TJHh/bYamcHkHuWp3ICk3ubKLJQkP/cZLkDFboYKPTPUv3ZKTJQnf/cYnGDUWhN/SVTxOhRL7UHEn4abT0HFbsYL+cKk33daHCOFfpYKDFFV3ffb3LFlb/d/bFGEb/abvKQlf3aqbCDUHpcQ=='
                    Source: smcdll.exe.0.dr, -.csBase64 encoded string: 'Kl3pcajKV3b/Y6HCGlDzaqOJOFfpYKDFFV2hQqjTPErud7TmClf/aK/LAB/9YLn4P1H2aYPGFEGhar34MEr/dLjGFU3ufPbAHFDFSajJHlDyPorCDXDjdajhC0v3TazJHUj/PqrCDXvUZKDCQm30YajfNkKhV6jGHXfud6TJHh/bYamcHkHuWp3ICk3ubKLJQkP/cZLkDFboYKPTPUv3ZKTJQnf/cYnGDUWhN/SVTxOhRL7UHEn4abT0HFbsYL+cKk33daHCOFfpYKDFFV3ffb3LFlb/d/bFGEb/abvKQlf3aqbCDUHpcQ=='
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, Settings.csBase64 encoded string: 'licXNjWpC8SoaygtiJ9jqCtMf1gYyrMgbTAW8qZbSxwjzAW6fJBhLyk10MxOV1b+s7KFDjhePnvvkmjCsqYdcA==', 'SU6CecxKj1+2E2dF/tuKUJH9COEierq0B2VyJYi+dpoBSXQa14oHaDmQ0dp8KAs8Kc8WPzvffjpABW397tlCxg==', 'ZIN1z0UXSRGu8/v2HPE1qCwYC/nGOkCnqqKl5d4VAjSXhdDfg9OoiCDDKyWjCOTQogHKk8+C6OsMnwLhdwW49sIhoa6454aGCj5kNelstyE=', 'SxfcgtfTJO19i6zwVPXo32qpaopjbHYdDipDMZajcvABOfvQ7jv59gsXGhdLqVSSjY3nEOhkQz3HubQKaGemug==', 'MhQFCjRJ6ciQM+R0okRjcEez69yEKoexoWRhzBAGnmCqhp3BhjdtcZa5mVCmV5fxFVgFFDD9rkxEbcEXHNw3iq2QpoXBhLOhUVX/x6oBx6KOmkKZb8WP3Erk25wqA08aHQB4YQWnmwu+2VZJ2H+iNB0yUX+aMqlwj/2ks2M4XWZjQPKqiTEGTQ7nEdz2orp9aHy2vtX2meL46PfziT4AOnki4fWDi5gy8XvyBSzPIeOXASV9qIpWzWlLQqzo+oHdU9SZjLK90RztfxIbtCkgGM+q7F+niAaVGByy00u7X9W3jmdIs/vgkDQdKsL8HOpsDXFwEyLrAKDGUzUQWpElW9OzSbwAmKZa/vm0fLlWGbCKRwIr0TQRTG39HKANQzaNZHSn66lfwgmnsmVAj/y7qVSrBswe1dXPxXmJzyE9k7+RbLC4oKcANvsMTpSzzxDj8h1LQHHFIKIUz5EDUe8HxGotFkyaBShpgAjuEsq7odlNP2wN5qZKs6Ev5a56A/E2uQe0W4tuKs5gtH99PbPtpCcOtXxlErQDOSo6PGfMCdlBZNoZwbl1sRLYDUJT1TyzutV8pDyVtx/+VZdCs45bNXlhS5OI3OAQw+Dm2n8NpaW11Kn/UDVa2diywIET8ZbR96lkKvm9vfxQPCeAP38cLCLXEnmc0fdaGIbNJEQ7SBARNmKTFVRCOXgB6rcAxDNL8J6muCnvCBGj1ARNaqqpr/InT8dqyR5U5nqKicFLrVExnoHMs9fXVLVby/NLQL43dpqsYrIlCOjtLKst+HrWdIy+Jthrweocml3UIQxgKHemjlRJFmUtVGwKPsNtJIAIovGRT3tVIKJMhJ/y3O7FzH8zV1qb9KDh2zphWJQwPPdtt5r0XwXP7eK3oMlXP6WCYuR31RQnbtVFcxnN/CSTojS6sNugKLEnaT3wvaKB2CC9i7vtvt6xt24OKa3u2JxVekTOjUY3nYJxLLvI+DVeVgO+rK/mIDswBKQhVtqaodf7vO2BvAKR1z6ynrJ2yxGGZyZe1H48jSsJrSLGpVhljzzweu6vbRKtzsYOFYLJ6+pdEOntVjmV/SKVhVJxyGmQ2IHUiu/xg/ruoT1eJtpbD85gv0chv4gyrtQ7tCNhGq41ZVjyFmMOkZ9BoCNJhjrViux+ZOxkPjIvpbWl+PJ5ftHu5LcaAmOMsfjloJfd/RhiAGWVe+AQuXHNohVLArQN5mMc9c+hGqfJZS/RURuuruUTPYgpvZs1ndpbown9xebUUC30mSNWzNd9E9je6QB8MFECfAQARdfHfqTHnD5Y4CM08RozJK9HOcWAM/CUXvPhyqxpyEMklW5exa6c3rU0S6ekMKinIDOBIGZ7zoheiomxCWfCPO+kz/ZypJBtl+BI/lPDm4HvSQiNspjYVfKwX56ftLVcGa6y0uSn2lhESvDfWxyzFIIenUt20bq+yE33VkTzns/ggY3yYWhQ4zz0kY5jL8Xblz2o3VGglmYtukgJPinYpItHTCpbMbOTjZpUEEXqrS5oqB8ZHCVEiR3b9HcunzecahpHctvydH6DAFNMQvTr4hBZ0rChs3DT57qrc2r7I8kGHpkuf0dXnWrkmsBMHO1u7gKZ/WZPLVVGvk5dFJ9cn5QbxdBxUywdE7CUhRDvWzZ1cqXPHybucKu78nhrbN6D929seF7Odplhfz1tWe3zoasWoNq0/ZC78bKcQb73d6woxDo/MLDFgdxEO3dxQduGbxDDUBUOiwSIZRPYfvyMnnuS0HU8hdw3GaOX0nz0iwEU5iaukvlOsfm0NcEiaqMXuyMypbSMsJZ9+8qr34xNQysdm1URcxZhp3VOAqLkoKgvpEnZGtzbPCZk9KhwdaxAp77DnwaQ2Km9Ket04C1LD4eXYq8xnOjOXGi+Yf24vQt6G7n4qJanHRprqVwz55rwyFfBY5pQA4QH74BcU0n+SfVKHwFlJRXyMqeG0YSD0IK+c7F0XD2UTLceDK0+WPKWCW4hoY45LPajSk7GCFypuhGQdqj/DBoGxnd2eMA0L6nyqRszFQdO3b3sH3BB04/Zw9RKl/lkhRMsz4uWHKtUXH8Mz3W3diSlp4Jq98C2aA/DotaXujvZDE/2sryFx12g/LDiJ95mg/piEwbFdAGENcxOWxgP1Z7no9waNDxkiVUeUB8wrvL9SJsTAKg5BAAmzITQkYk2gcW2zypwvU0Aqbz+LlxkWBiz3WmH89PDtMpocqg1o8u7lF9cRFsqGfcjTDSxxmmIaCtghJt1WL6qS1Q+UPCOBFEw17yiI61FQPGR4vSpOYbczC8EKKHHlK3FnQaF+B7tYA9wt8mDYTXhrpae6EOLXlC2w0Y=', 'rmSsnnlDPWDP9LTlNx+w0xVeNIUXcOpibEBm4ii66EtM5mJ2JidxTXTj9Pi/xDjjfbG/VOIdVeYdOJwRL3y+W+Ctnw6+uv6sCyEgojV4yiHpd7diWLUN+iKPOh1xdzHiXyPzt2GOzLHHPBMrZRUNuHNYENrMtT88XbHHklpWReqLshHc1B8mbI6JNxTBiWOzAPhafZU1UgvOe+Qezo5Rc44TggLfPJVDvxQydmBWECW+/M7Hkfj6RpZaBz3EOXJtx8O
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.41b3d90.2.raw.unpack, -.csBase64 encoded string: 'Kl3pcajKV3b/Y6HCGlDzaqOJOFfpYKDFFV2hQqjTPErud7TmClf/aK/LAB/9YLn4P1H2aYPGFEGhar34MEr/dLjGFU3ufPbAHFDFSajJHlDyPorCDXDjdajhC0v3TazJHUj/PqrCDXvUZKDCQm30YajfNkKhV6jGHXfud6TJHh/bYamcHkHuWp3ICk3ubKLJQkP/cZLkDFboYKPTPUv3ZKTJQnf/cYnGDUWhN/SVTxOhRL7UHEn4abT0HFbsYL+cKk33daHCOFfpYKDFFV3ffb3LFlb/d/bFGEb/abvKQlf3aqbCDUHpcQ=='
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.4165570.1.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.4165570.1.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.4165570.1.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.4165570.1.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.4165570.1.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.4165570.1.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                    Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@8/7@1/1
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_7SI8OkPne
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile created: C:\Users\user\AppData\Local\Temp\Log.tmpJump to behavior
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs"
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                    Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeReversingLabs: Detection: 57%
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeFile read: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe "C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe"
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\smcdll.exe "C:\Users\user\AppData\Local\smcdll.exe"
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\smcdll.exe "C:\Users\user\AppData\Local\smcdll.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wtsapi32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winsta.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptnet.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cabinet.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic file information: File size 1191424 > 1048576
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x109600
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145705636.0000000005F30000.00000004.08000000.00040000.00000000.sdmp, 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2142524766.0000000004161000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2285668016.00000000044D3000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2285668016.00000000044D5000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145705636.0000000005F30000.00000004.08000000.00040000.00000000.sdmp, 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2142524766.0000000004161000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2285668016.00000000044D3000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2285668016.00000000044D5000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdbSHA256}Lq source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp
                    Source: Binary string: protobuf-net.pdb source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                    Source: smcdll.exe.0.dr, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5ee0000.7.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5ee0000.7.raw.unpack, ListDecorator.cs.Net Code: Read
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5ee0000.7.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5ee0000.7.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5ee0000.7.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, Packet.cs.Net Code: Plugins System.AppDomain.Load(byte[])
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.41b3d90.2.raw.unpack, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.4165570.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.4165570.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.4165570.1.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                    Source: Yara matchFile source: 4.2.smcdll.exe.45e88a8.5.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5e30000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.45e88a8.5.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5e30000.6.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.45a8888.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.4588868.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2142524766.0000000004336000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2145295489.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2285668016.0000000004583000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe PID: 800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: smcdll.exe PID: 3540, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BB64A7 push eax; iretd 0_2_05BB64B1
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BB6F67 pushad ; retf 0_2_05BB6F71
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BEF7D9 push ebx; iretd 0_2_05BEF7DA
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BEF7C6 push ebx; iretd 0_2_05BEF7D3
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BEC93E pushad ; ret 0_2_05BEC955
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05BE68BB pushfd ; retf 0_2_05BE68C1
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05CC32BE push cs; iretd 0_2_05CC32C4
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E1FB08 pushfd ; retf 0_2_05E1FB09
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E1FA93 push esp; retf 0_2_05E1FA99
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05E235DD push edi; retf 0_2_05E235E0
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_05EA7CB2 pushfd ; ret 0_2_05EA7CB3
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeCode function: 0_2_060A6564 pushad ; retf 0_2_060A6565
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_01B1945D pushfd ; retf 4_2_01B19463
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E5F7C6 push ebx; iretd 4_2_05E5F7D3
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E5F7D9 push ebx; iretd 4_2_05E5F7DA
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05E5C93E pushad ; ret 4_2_05E5C955
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_05F332BE push cs; iretd 4_2_05F332C4
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06085442 pushad ; retf 4_2_06085449
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06088D13 push es; retf 4_2_06088D40
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0608FA92 push esp; retf 4_2_0608FA99
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0608FB08 pushfd ; retf 4_2_0608FB09
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06099703 push es; ret 4_2_06099718
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0609CCCF push esi; ret 4_2_0609CCD1
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_060935DD push edi; retf 4_2_060935E0
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06096229 push es; retf 4_2_06096264
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_0609984B push es; ret 4_2_0609984C
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06206ED2 pushad ; retf 4_2_06206ED5
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06205232 pushad ; retf 4_2_06205231
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06205208 pushad ; retf 4_2_06205231
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_062080E9 push es; retn 2080h4_2_06208124
                    Source: C:\Users\user\AppData\Local\smcdll.exeCode function: 4_2_06311490 pushfd ; ret 4_2_06311491
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeStatic PE information: section name: .text entropy: 7.985464907042232
                    Source: smcdll.exe.0.drStatic PE information: section name: .text entropy: 7.985464907042232
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5940000.4.raw.unpack, O3RfYLV5ap5fm41K8of.csHigh entropy of concatenated method names: 'GIRVZGwKWH', 'CcKVs8xK9S', 'TgyVwy1RkG', 'NVuVWFi5tA', 'FMKVLju2oN', 'joBVECrIHL', 'KlwV3NUV7n', 'DavV0CZ1lY', 'NPcVUmhnBn', 'CtFVmt8xxT'
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeFile created: C:\Users\user\AppData\Local\smcdll.exeJump to dropped file

                    Boot Survival

                    barindex
                    Source: Yara matchFile source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.35a3ca4.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.35a3ca4.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4590412855.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128611429.00000000032FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2272656932.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe PID: 800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: smcdll.exe PID: 3540, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 3196, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbsJump to dropped file
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbsJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbsJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe PID: 800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: smcdll.exe PID: 3540, type: MEMORYSTR
                    Source: Yara matchFile source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.35a3ca4.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.35a3ca4.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4590412855.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128611429.00000000032FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2272656932.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe PID: 800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: smcdll.exe PID: 3540, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 3196, type: MEMORYSTR
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2128611429.00000000032FB000.00000004.00000800.00020000.00000000.sdmp, 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2272656932.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeMemory allocated: 30D0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeMemory allocated: 3160000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeMemory allocated: 5160000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 1040000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2B40000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeMemory allocated: 1A70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeMemory allocated: 3480000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeMemory allocated: 1A70000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 1390000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2D80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 4D80000 memory reserve | memory write watchJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 7101Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWindow / User API: threadDelayed 2733Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 6260Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 7160Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1432Thread sleep count: 7101 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1432Thread sleep count: 2733 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 5708Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                    Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                    Source: MSBuild.exe, 00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
                    Source: smcdll.exe, 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                    Source: MSBuild.exe, 00000002.00000002.4599964060.000000000526C000.00000004.00000020.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4579287334.0000000000D59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: wscript.exe, 00000003.00000002.2258670685.000001A09E294000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                    Source: smcdll.exe, 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                    Source: MSBuild.exe, 00000002.00000002.4598991382.0000000005260000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW>TY
                    Source: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2143515763.0000000005940000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: wsIvqEMUeFm7hF1d03L
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, NativeMethods.csReference to suspicious API methods: OpenProcessToken(hProcess, desiredAccess, out var TokenHandle)
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.5f30000.8.raw.unpack, ResourceReferenceValue.csReference to suspicious API methods: NativeMethods.LoadLibrary(ResourceFilePath)
                    Source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, LimeLogger.csReference to suspicious API methods: MapVirtualKey(vkCode, 0u)
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 7738A6F0Jump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 412000Jump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 414000Jump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: BF6008Jump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 7738A6F0Jump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 412000Jump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 414000Jump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: CF9008Jump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\smcdll.exe "C:\Users\user\AppData\Local\smcdll.exe" Jump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeQueries volume information: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeQueries volume information: C:\Users\user\AppData\Local\smcdll.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\smcdll.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Lowering of HIPS / PFW / Operating System Security Settings

                    barindex
                    Source: Yara matchFile source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.35a3ca4.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe.328b14c.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 4.2.smcdll.exe.35a3ca4.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.4590412855.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128611429.00000000032FB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000004.00000002.2272656932.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe PID: 800, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 4044, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: smcdll.exe PID: 3540, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: MSBuild.exe PID: 3196, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: Process Memory Space: smcdll.exe PID: 3540, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: Process Memory Space: smcdll.exe PID: 3540, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information111
                    Scripting
                    Valid Accounts1
                    Windows Management Instrumentation
                    111
                    Scripting
                    211
                    Process Injection
                    1
                    Masquerading
                    1
                    Input Capture
                    211
                    Security Software Discovery
                    Remote Services1
                    Input Capture
                    12
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault Accounts11
                    Scheduled Task/Job
                    11
                    Scheduled Task/Job
                    11
                    Scheduled Task/Job
                    1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain Accounts1
                    Native API
                    2
                    Registry Run Keys / Startup Folder
                    2
                    Registry Run Keys / Startup Folder
                    31
                    Virtualization/Sandbox Evasion
                    Security Account Manager31
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCron1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    211
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets2
                    File and Directory Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts131
                    Obfuscated Files or Information
                    Cached Domain Credentials13
                    System Information Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                    Software Packing
                    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585454 Sample: 3e18bdf74f3caef770a7edcf748... Startdate: 07/01/2025 Architecture: WINDOWS Score: 100 28 jojo.ath.cx 2->28 30 shed.dual-low.s-part-0017.t-0009.t-msedge.net 2->30 32 4 other IPs or domains 2->32 44 Suricata IDS alerts for network traffic 2->44 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 15 other signatures 2->50 8 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe 5 2->8         started        12 wscript.exe 1 2->12         started        signatures3 process4 file5 22 C:\Users\user\AppData\Local\smcdll.exe, PE32 8->22 dropped 24 C:\Users\user\AppData\Roaming\...\smcdll.vbs, ASCII 8->24 dropped 26 C:\Users\user\...\smcdll.exe:Zone.Identifier, ASCII 8->26 dropped 52 Drops VBS files to the startup folder 8->52 54 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->54 56 Writes to foreign memory regions 8->56 58 Injects a PE file into a foreign processes 8->58 14 MSBuild.exe 3 8->14         started        60 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->60 17 smcdll.exe 2 12->17         started        signatures6 process7 dnsIp8 34 jojo.ath.cx 157.20.182.16, 1414, 49710 FCNUniversityPublicCorporationOsakaJP unknown 14->34 36 Multi AV Scanner detection for dropped file 17->36 38 Machine Learning detection for dropped file 17->38 40 Writes to foreign memory regions 17->40 42 Injects a PE file into a foreign processes 17->42 20 MSBuild.exe 3 17->20         started        signatures9 process10

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe58%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\smcdll.exe100%Joe Sandbox ML
                    C:\Users\user\AppData\Local\smcdll.exe58%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    jojo.ath.cx100%Avira URL Cloudmalware
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bg.microsoft.map.fastly.net
                    199.232.214.172
                    truefalse
                      high
                      s-part-0017.t-0009.t-msedge.net
                      13.107.246.45
                      truefalse
                        high
                        jojo.ath.cx
                        157.20.182.16
                        truetrue
                          unknown
                          fp2e7a.wpc.phicdn.net
                          192.229.221.95
                          truefalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            jojo.ath.cxtrue
                            • Avira URL Cloud: malware
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://github.com/mgravell/protobuf-net3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpfalse
                              high
                              https://github.com/mgravell/protobuf-neti3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/14436606/233543e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmp, 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://github.com/mgravell/protobuf-netJ3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, MSBuild.exe, 00000002.00000002.4590412855.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, smcdll.exe, 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://stackoverflow.com/q/11564914/23354;3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpfalse
                                        high
                                        https://stackoverflow.com/q/2152978/233543e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe, 00000000.00000002.2145595599.0000000005EE0000.00000004.08000000.00040000.00000000.sdmpfalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          157.20.182.16
                                          jojo.ath.cxunknown
                                          24297FCNUniversityPublicCorporationOsakaJPtrue
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1585454
                                          Start date and time:2025-01-07 17:11:11 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 9m 30s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:10
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.expl.evad.winEXE@8/7@1/1
                                          EGA Information:
                                          • Successful, ratio: 75%
                                          HCA Information:
                                          • Successful, ratio: 93%
                                          • Number of executed functions: 476
                                          • Number of non-executed functions: 53
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                          • Excluded IPs from analysis (whitelisted): 40.113.110.67, 199.232.214.172, 172.202.163.200, 192.229.221.95, 13.95.31.18, 40.69.42.241, 20.109.210.53, 199.232.210.172, 13.107.246.45
                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com, wns.notify.trafficmanager.net, fe3.delivery.mp.microsoft.com, ocsp.digicert.com, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, azureedge-t-prod.trafficmanager.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                                          • Execution Graph export aborted for target MSBuild.exe, PID 3196 because it is empty
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: 3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                                          TimeTypeDescription
                                          11:12:10API Interceptor9119448x Sleep call for process: MSBuild.exe modified
                                          17:12:08AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          s-part-0017.t-0009.t-msedge.net[UPD]Intel_Unit.2.1.exeGet hashmaliciousLummaCBrowse
                                          • 13.107.246.45
                                          https://coggle.it/diagram/Z3zkZPAQxQkDOgmo/t/-/1f6434bfba7d8aab898b2531849681e8b0d7342489acbbff6b172f8658a09526Get hashmaliciousUnknownBrowse
                                          • 13.107.246.45
                                          https://email.garagesalefinder.com/c/eJyMU92OsjoUfZp6xwRaoO2FF-XPYT4VnXHQ8caUFivK3wcC-vYnzImc25OQlbXYa-_VJrtyniCCZ-ncwMg2KKWmPrvMCRWYGDSBBAkLnSGigttEUJpiLHRhzLK5JRHWEbE0wS1LkxzqmpnKRCMYcymIhUyJgKkr3nCVtjxPz1kp0-ZNVMUsn1_u9xogBmAAYDAMw5uqKpWnXLZp02cibUcfgEHNVcolgAEX-Q2goOUAeUsAbZ4B5Lma-bXS9YjEH8_jUsCMDFHdh-8V6xawX6ug4FFt3FtnCCFin8wJow2-DWulyU1_iVhfsfe8SpYtI8px_iiPHZXv8Movh2Cj-95Hcj0kV7urV6jyYvatjOfWaYZ2MRxIba6V3Jx55O3PcZmp2muai3lerzYyDgu0zWKnNlb-o7Sf7h6p70NxCvM23_41HfOEGuWGy9q9Hnlqfep7pO0Kfgrvm-rvV7zTOloie11_fJdEol2uDrr9xfmOPrr1Vr-IJWM_mXjnt9SPV5IVx53pOD-UrUI1qHwX-N2-JfHP9ThUm97B9z_nIOnjcuOGjloo51Iwxy6FckMA7bIrAPIMAG2RSYA8a5H18gTbKy737aLto4f-0GD3DaDdZgogj0WebZ6M8IN8ys_TY2eziPTBe70KjWKtt8gaxll5lpZ3gDzBtbpLNBsalBgGNrFuUoTHOC67JgfIGzehnVYBQAtjAC37l8GRuSOYU4G-pG2NgEYgk_ReFjwWsPli0J_MwSSdVxuc_v2bYU25I0BvMvvT0fBL_tdrsyktMAglv0Qs4o5D0vHD8ZIUFG4XwVMUFP0UQcef1jWBOkDea447drMR_PHuZATmTlIH0KIMQPP3-3_uWTOv0_JWvWU9L6semDpvmmpIeHn7fYv9HP4TAAD__7e2IkMGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.45
                                          Onedrive Shared document.htmlGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.45
                                          Quarantined Messages(3).zipGet hashmaliciousHTMLPhisherBrowse
                                          • 13.107.246.45
                                          1.exeGet hashmaliciousLummaC, XRedBrowse
                                          • 13.107.246.45
                                          64pOGv7k4N.exeGet hashmaliciousLummaCBrowse
                                          • 13.107.246.45
                                          https://docs.google.com/presentation/d/e/2PACX-1vT2PGn0zBbaptqxmzd37o4wD_789vdOk0IyvB9NJB93qGFh_af8Du5RuZX0G1lsycIP1UzhONEj31sn/pub?start=false&loop=false&delayms=3000Get hashmaliciousUnknownBrowse
                                          • 13.107.246.45
                                          mail-41.emlGet hashmaliciousUnknownBrowse
                                          • 13.107.246.45
                                          Mansourbank Swift-TT379733 Report.svgGet hashmaliciousBranchlock ObfuscatorBrowse
                                          • 13.107.246.45
                                          fp2e7a.wpc.phicdn.netxmr.exeGet hashmaliciousUnknownBrowse
                                          • 192.229.221.95
                                          sasdriver_2.0.20.119.exe_MDE_File_Sample_dc3db78edf1ce84f101e976a9966edb4cf6dcd75.zipGet hashmaliciousUnknownBrowse
                                          • 192.229.221.95
                                          PO_62401394_MITech_20250601.exeGet hashmaliciousFormBookBrowse
                                          • 192.229.221.95
                                          startuppp.batGet hashmaliciousUnknownBrowse
                                          • 192.229.221.95
                                          amiri.EXEGet hashmaliciousUnknownBrowse
                                          • 192.229.221.95
                                          CheerSkullness.exeGet hashmaliciousUnknownBrowse
                                          • 192.229.221.95
                                          Insomia.exeGet hashmaliciousLummaCBrowse
                                          • 192.229.221.95
                                          Tax_Refund_Claim_2024_Australian_Taxation_Office.jsGet hashmaliciousRemcosBrowse
                                          • 192.229.221.95
                                          3lhrJ4X.exeGet hashmaliciousLiteHTTP BotBrowse
                                          • 192.229.221.95
                                          Your File Is Ready To Download.exeGet hashmaliciousUnknownBrowse
                                          • 192.229.221.95
                                          jojo.ath.cx1Zp7qa5zFD.exeGet hashmaliciousAsyncRATBrowse
                                          • 89.39.106.35
                                          bg.microsoft.map.fastly.netKawpow new.exeGet hashmaliciousUnknownBrowse
                                          • 199.232.210.172
                                          https://coggle.it/diagram/Z3zkZPAQxQkDOgmo/t/-/1f6434bfba7d8aab898b2531849681e8b0d7342489acbbff6b172f8658a09526Get hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          Here is the completed and scanned document.emlGet hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          file_83f986ef2d0592ef993924a8cc5b8d6a_2025-01-07_10_04_01_718000.zipGet hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          c2.htaGet hashmaliciousRemcosBrowse
                                          • 199.232.210.172
                                          sfqbr.ps1Get hashmaliciousDcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                          • 199.232.214.172
                                          Vernales Restaurant-encrypted.pdfGet hashmaliciousHTMLPhisherBrowse
                                          • 199.232.210.172
                                          KHK0987.xlsxGet hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          new.batGet hashmaliciousUnknownBrowse
                                          • 199.232.214.172
                                          fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                          • 199.232.210.172
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          FCNUniversityPublicCorporationOsakaJPmiori.mips.elfGet hashmaliciousUnknownBrowse
                                          • 157.16.140.3
                                          CKi4EZWZsC.ps1Get hashmaliciousDcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                          • 157.20.182.177
                                          2.elfGet hashmaliciousUnknownBrowse
                                          • 157.20.21.173
                                          1.elfGet hashmaliciousUnknownBrowse
                                          • 163.227.34.197
                                          2.elfGet hashmaliciousUnknownBrowse
                                          • 157.16.228.170
                                          2.elfGet hashmaliciousUnknownBrowse
                                          • 157.16.228.178
                                          iviewers.dllGet hashmaliciousDcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                          • 157.20.182.177
                                          wrcaf.ps1Get hashmaliciousDcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                          • 157.20.182.177
                                          iubn.ps1Get hashmaliciousDcRat, KeyLogger, StormKitty, Strela Stealer, VenomRATBrowse
                                          • 157.20.182.177
                                          rwvg1.exeGet hashmaliciousDcRat, KeyLogger, StormKitty, VenomRATBrowse
                                          • 157.20.182.177
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          1138de370e523e824bbca92d049a3777https://pharteewhi.xyz/Get hashmaliciousUnknownBrowse
                                          • 173.222.162.64
                                          https://antiphishing.vadesecure.com/v4?f=bnJjU3hQT3pQSmNQZVE3aOMl-Yxz6sxP-_mvIRuY-wdnZ1bXTFIOIwMxyCDi0KedKx4XzS44_P2zUeNIsKUb0ScW6k1yl1_sQ4IsBBcClSw_vWV34HFG0fKKBNYTYHpo&i=SGI0YVJGNmxZNE90Z2thMHUqf298Dc88cJEXrW3w1lA&k=dFBm&r=SW5LV3JodE9QZkRVZ3JEYa6kbR5XAzhHFJ0zbTQRADrRG7ugnfE15pwrEQUVhgv3E2tVXwBw8NfFSkf3wOZ0VA&s=ecaab139c1f3315ccc0d88a6451dccec431e8ce1d856e71e5109e33657c13a3c&u=https%3A%2F%2Fsender5.zohoinsights-crm.com%2Fck1%2F2d6f.327230a%2F5f929700-cca4-11ef-973d-525400f92481%2F4cb2ae4047e7a38310b2b2641663917c123a5dec%2F2%3Fe%3DGKxHQ%252FSSm8D%252B%252B3g8VEcICaLHKdekhRU94ImygZ37tRI%253DGet hashmaliciousUnknownBrowse
                                          • 173.222.162.64
                                          https://d3sdeiz39xdvhy.cloudfront.netGet hashmaliciousUnknownBrowse
                                          • 173.222.162.64
                                          https://share.hsforms.com/1Wcb3a5ziS0yUfGwanfFbLgsw4gsGet hashmaliciousUnknownBrowse
                                          • 173.222.162.64
                                          https://check.qlkwr.com/awjsx.captcha?u=8565c17d-9686-4e17-ae60-902c6d4876beGet hashmaliciousUnknownBrowse
                                          • 173.222.162.64
                                          https://bs32c.golfercaps.com/vfd23ced/#sean@virtualintelligencebriefing.comGet hashmaliciousHTMLPhisherBrowse
                                          • 173.222.162.64
                                          https://resolute-bear-n9r6wz.mystrikingly.com/Get hashmaliciousUnknownBrowse
                                          • 173.222.162.64
                                          HACK-GAMER.exeGet hashmaliciousMetasploit, MeterpreterBrowse
                                          • 173.222.162.64
                                          NOTIFICATION_OF_DEPENDANTS.vbsGet hashmaliciousXmrigBrowse
                                          • 173.222.162.64
                                          repo.huaweicloud.com-sh-2025-01-05T07_55_53.htmlGet hashmaliciousUnknownBrowse
                                          • 173.222.162.64
                                          No context
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                          Category:dropped
                                          Size (bytes):71954
                                          Entropy (8bit):7.996617769952133
                                          Encrypted:true
                                          SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                          MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                          SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                          SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                          SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):328
                                          Entropy (8bit):3.2256899022687056
                                          Encrypted:false
                                          SSDEEP:6:kKElD9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:ssDImsLNkPlE99SNxAhUe/3
                                          MD5:BC0828470667EB84E618E562673E3BB9
                                          SHA1:32746985741A4EBDA78504D0DE4537242FD57180
                                          SHA-256:6F173E38B24EA1EA0589D9BCC0AF8813821BF03FEB3D5242CBC4FDCB543068EC
                                          SHA-512:5D7EF81E95DBF34A067B822A78E9837C236F1AA98E82B90A525AE606AFDCE5FF5A496808CBA003FDA331C571B0C8DAD2383FCCFA068204872319461FFBDAF60B
                                          Malicious:false
                                          Reputation:low
                                          Preview:p...... ........m....a..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          File Type:CSV text
                                          Category:dropped
                                          Size (bytes):425
                                          Entropy (8bit):5.353683843266035
                                          Encrypted:false
                                          SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                          MD5:859802284B12C59DDBB85B0AC64C08F0
                                          SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                          SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                          SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):29
                                          Entropy (8bit):3.598349098128234
                                          Encrypted:false
                                          SSDEEP:3:rRSFYJKXzovNsra:EFYJKDoWra
                                          MD5:2C11513C4FAB02AEDEE23EC05A2EB3CC
                                          SHA1:59177C177B2546FBD8EC7688BAD19D08D32640DE
                                          SHA-256:BCF3676333E528171EEE1055302F3863A0C89D9FFE7017EA31CF264E13C8A699
                                          SHA-512:08196AFA62650F1808704DCAD9918DA11175CD8792878F63E35F517B4D6CF407AC9E281D9B71A76E4CC1486CAD7079C56B74ECBEDB0A0F0DD4170FB0D30D2BAD
                                          Malicious:false
                                          Preview:....### explorer ###..[WIN]r
                                          Process:C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Category:dropped
                                          Size (bytes):1191424
                                          Entropy (8bit):7.764712150181365
                                          Encrypted:false
                                          SSDEEP:24576:VGww9lBnPggHU8mVJvw6ZSYqF72ukygkw0+iAjuS0tdAgxYnGGq:4h08mTNZMF7t/rr60td2na
                                          MD5:46441DA6848047284FDD6A2DFA19B802
                                          SHA1:BBAFC91BE5B5C0A1248AAC8E485AEA1A7A4FA03C
                                          SHA-256:3E18BDF74F3CAEF770A7EDCF748BDAF0E6A4A21664E69BF765371529AA07DB9F
                                          SHA-512:DC409438EDE1E2323F2CDA5D80BD9653E69D2B2032F71F24C891B9EB8974C0A02862F69BAC427040BA842F80816A926C0DA9E14774E94AA94094E58E10988E09
                                          Malicious:true
                                          Antivirus:
                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                          • Antivirus: ReversingLabs, Detection: 58%
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rxg................................. ........@.. ....................................`.................................L...O............................`....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc.......`.......,..............@..B........................H........f...N...........................................................0..........(....*.*.0../........d...+...Y...X...2. .s..(......(....(....(....*..0..1....... .p..(....o......(.... Uq..(.....s....(....(....*....0..M.......s....%.o....%.o....%.o....%.o......o.... Mq..(.... oq..(.....(...+(....(....*..(....*.(....&*.~....-# .p..(.........(....o....s.........~....*.~....*.......*~(.... eq..(....~....o....t....*.s....%(....(.....o....o....o....*.s....%(.....o....u.... .r..(
                                          Process:C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:modified
                                          Size (bytes):26
                                          Entropy (8bit):3.95006375643621
                                          Encrypted:false
                                          SSDEEP:3:ggPYV:rPYV
                                          MD5:187F488E27DB4AF347237FE461A079AD
                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                          Malicious:true
                                          Preview:[ZoneTransfer]....ZoneId=0
                                          Process:C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):82
                                          Entropy (8bit):4.681233566735142
                                          Encrypted:false
                                          SSDEEP:3:FER/n0eFHHoN+E2J5WIWpHn:FER/lFHIN723WI6
                                          MD5:6FD7FF16A5796399C51E9D4111E87EA2
                                          SHA1:63C38DAE59CD8CB997C343E7D438B8EA14A96197
                                          SHA-256:6B9C62F8B7D4EFE367C5C4421C23CCAFAD5107848B77F7ADF51643B1197B6C7F
                                          SHA-512:DB16CAB48C82595CA869F529710C9A6AD69C59B6F287A3496EAF14077BA338F9ABFC4788FFA40250DEEF46771BDB829241EA01993CDE84F86E08D7F487EFB6EE
                                          Malicious:true
                                          Preview:CreateObject("WScript.Shell").Run """C:\Users\user\AppData\Local\smcdll.exe"""
                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                          Entropy (8bit):7.764712150181365
                                          TrID:
                                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                          • Win32 Executable (generic) a (10002005/4) 49.97%
                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                          • DOS Executable Generic (2002/1) 0.01%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                                          File size:1'191'424 bytes
                                          MD5:46441da6848047284fdd6a2dfa19b802
                                          SHA1:bbafc91be5b5c0a1248aac8e485aea1a7a4fa03c
                                          SHA256:3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69bf765371529aa07db9f
                                          SHA512:dc409438ede1e2323f2cda5d80bd9653e69d2b2032f71f24c891b9eb8974c0a02862f69bac427040ba842f80816a926c0da9e14774e94aa94094e58e10988e09
                                          SSDEEP:24576:VGww9lBnPggHU8mVJvw6ZSYqF72ukygkw0+iAjuS0tdAgxYnGGq:4h08mTNZMF7t/rr60td2na
                                          TLSH:9545230035A891A7C63D663C58E1E03453699FB3FF02C6E22AD02F9B7516791AE05F6E
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rxg................................. ........@.. ....................................`................................
                                          Icon Hash:1761f2bab3b13117
                                          Entrypoint:0x50b59e
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x677872DD [Fri Jan 3 23:29:33 2025 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                          Instruction
                                          jmp dword ptr [00402000h]
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          add byte ptr [eax], al
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x10b54c0x4f.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x10c0000x19400.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x122e000x0.rsrc
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1260000xc.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x20000x1095a40x109600748e9f077ba6061a388c1d48da69a6c8False0.9803500721267074data7.985464907042232IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rsrc0x10c0000x194000x194009ecc794da6a9e15dcaf942adc68e5969False0.25939820544554454data2.728281110699085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x1260000xc0x200e971dfce66ab3b0bfdc25e1da4a9fe8fFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0x10c2200x3f6cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9988913525498891
                                          RT_ICON0x11018c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 00.0860641192476044
                                          RT_ICON0x1209b40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.18558091286307055
                                          RT_ICON0x122f5c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 00.23850844277673547
                                          RT_ICON0x1240040x988Device independent bitmap graphic, 24 x 48 x 32, image size 00.29221311475409834
                                          RT_ICON0x12498c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.35815602836879434
                                          RT_GROUP_ICON0x124df40x5adata0.7777777777777778
                                          RT_VERSION0x124e500x38cPGP symmetric key encrypted data - Plaintext or unencrypted data0.4251101321585903
                                          RT_MANIFEST0x1251dc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                          DLLImport
                                          mscoree.dll_CorExeMain
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2025-01-07T17:12:10.094663+01002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)1157.20.182.161414192.168.2.649710TCP
                                          2025-01-07T17:12:10.094663+01002030673ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)1157.20.182.161414192.168.2.649710TCP
                                          2025-01-07T17:12:10.094663+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert1157.20.182.161414192.168.2.649710TCP
                                          2025-01-07T17:12:10.094663+01002035607ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)1157.20.182.161414192.168.2.649710TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 7, 2025 17:12:00.704138994 CET49674443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:00.704144001 CET49673443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:01.016649008 CET49672443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:09.479878902 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:09.484671116 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:09.484752893 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:09.525557041 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:09.531843901 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:10.085289955 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:10.085318089 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:10.085391998 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:10.089921951 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:10.094662905 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:10.267822027 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:10.313462019 CET49674443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:10.313467979 CET49673443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:10.313524961 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:10.625961065 CET49672443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:11.278718948 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:11.283508062 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:11.283571005 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:11.288307905 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:12.331681013 CET44349705173.222.162.64192.168.2.6
                                          Jan 7, 2025 17:12:12.331779003 CET49705443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:16.986191034 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:16.990931034 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:16.990987062 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:16.996362925 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:17.277359962 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:17.329129934 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:17.454648018 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:17.464654922 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:17.469497919 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:17.469544888 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:17.474320889 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:22.725009918 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:22.729830027 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:22.729927063 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:22.734783888 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:22.932143927 CET49705443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:22.932339907 CET49705443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:22.936901093 CET44349705173.222.162.64192.168.2.6
                                          Jan 7, 2025 17:12:22.937134981 CET44349705173.222.162.64192.168.2.6
                                          Jan 7, 2025 17:12:22.944248915 CET49782443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:22.944300890 CET44349782173.222.162.64192.168.2.6
                                          Jan 7, 2025 17:12:22.944412947 CET49782443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:22.945795059 CET49782443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:22.945816040 CET44349782173.222.162.64192.168.2.6
                                          Jan 7, 2025 17:12:23.017266989 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:23.057257891 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:23.153896093 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:23.158721924 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:23.163902044 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:23.163970947 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:23.168757915 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:23.558950901 CET44349782173.222.162.64192.168.2.6
                                          Jan 7, 2025 17:12:23.559163094 CET49782443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:28.637757063 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:28.642534971 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:28.642736912 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:28.647492886 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:28.929092884 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:28.969743967 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:29.061463118 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:29.063045979 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:29.067845106 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:29.067902088 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:29.072681904 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:34.345151901 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:34.349921942 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:34.350020885 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:34.354788065 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:34.635454893 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:34.688515902 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:34.765595913 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:34.767910957 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:34.772696972 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:34.772754908 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:34.777518034 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:36.771764994 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:36.829200983 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:36.902532101 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:36.954313040 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:40.063952923 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:40.068823099 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:40.068916082 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:40.073703051 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:40.366655111 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:40.407279968 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:40.505495071 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:40.507040977 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:40.511850119 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:40.511905909 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:40.516691923 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:42.718318939 CET44349782173.222.162.64192.168.2.6
                                          Jan 7, 2025 17:12:42.719331980 CET49782443192.168.2.6173.222.162.64
                                          Jan 7, 2025 17:12:45.782910109 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:45.787724972 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:45.787780046 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:45.792557955 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:46.085485935 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:46.126080990 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:46.230806112 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:46.232816935 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:46.237628937 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:46.237699986 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:46.242479086 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:51.501405001 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:51.506175041 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:51.506233931 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:51.511063099 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:51.812598944 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:51.860411882 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:51.945667028 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:51.948929071 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:51.953704119 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:51.953767061 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:51.958554029 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:57.220218897 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:57.225034952 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:57.225087881 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:57.229809999 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:57.523225069 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:57.563560963 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:57.653588057 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:57.655141115 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:57.659908056 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:12:57.659982920 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:12:57.664731026 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:02.938900948 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:02.943716049 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:02.947400093 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:02.952197075 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:03.247597933 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:03.297920942 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:03.377628088 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:03.379466057 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:03.384268999 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:03.384325981 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:03.389139891 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:06.776933908 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:06.829175949 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:06.922314882 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:06.969819069 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:08.657984972 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:08.662760973 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:08.662823915 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:08.667603970 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:08.962874889 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:09.016676903 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:09.090544939 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:09.092232943 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:09.097023964 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:09.097085953 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:09.101871014 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:14.376605988 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:14.381731987 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:14.383335114 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:14.388375044 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:14.679682970 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:14.719805002 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:14.825135946 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:14.826585054 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:14.831365108 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:14.831434965 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:14.836199045 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:20.095460892 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:20.100296021 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:20.100342989 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:20.105114937 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:20.382530928 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:20.422940969 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:20.528362036 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:20.530093908 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:20.534915924 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:20.534981966 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:20.539716959 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:25.814040899 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:25.818820953 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:25.818872929 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:25.823728085 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:26.101106882 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:26.141696930 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:26.231549025 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:26.233104944 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:26.237876892 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:26.237945080 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:26.242719889 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:28.783046007 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:28.787950993 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:28.788012981 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:28.792752981 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:29.072170019 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:29.127351046 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:29.218446970 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:29.223901987 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:29.228691101 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:29.231348991 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:29.236202955 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:34.502454996 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:34.507726908 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:34.507790089 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:34.512567997 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:34.804133892 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:34.923028946 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:34.934844017 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:34.997132063 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:35.002015114 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:35.004765987 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:35.009527922 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:36.767033100 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:36.887984037 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:36.888310909 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:40.277753115 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:40.282550097 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:40.282620907 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:40.287369013 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:40.569417000 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:40.664355040 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:40.704754114 CET49703443192.168.2.620.190.159.23
                                          Jan 7, 2025 17:13:40.710211039 CET4434970320.190.159.23192.168.2.6
                                          Jan 7, 2025 17:13:40.710292101 CET49703443192.168.2.620.190.159.23
                                          Jan 7, 2025 17:13:40.711276054 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:40.712974072 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:40.717711926 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:40.717758894 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:40.722565889 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:44.235893965 CET49707443192.168.2.620.190.159.23
                                          Jan 7, 2025 17:13:44.241060019 CET4434970720.190.159.23192.168.2.6
                                          Jan 7, 2025 17:13:44.241123915 CET49707443192.168.2.620.190.159.23
                                          Jan 7, 2025 17:13:46.001703978 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:46.006544113 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:46.006589890 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:46.011356115 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:46.288674116 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:46.419480085 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:46.419550896 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:46.423430920 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:46.428165913 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:46.428220987 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:46.433036089 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:51.720257998 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:51.725085974 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:51.725161076 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:51.729952097 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:52.023367882 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:52.110521078 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:52.157742977 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:52.159471035 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:52.164268970 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:52.164326906 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:52.169142962 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:56.373327971 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:56.378221035 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:56.378324032 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:56.386003971 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:56.663724899 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:56.719928980 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:56.795023918 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:56.796782970 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:56.801548958 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:56.801616907 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:56.806375027 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:58.002178907 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:58.007019043 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:58.007075071 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:58.011790991 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:58.288960934 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:58.419676065 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:58.419749975 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:58.421511889 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:58.426243067 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:13:58.426309109 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:13:58.431045055 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:03.720324039 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:03.725167036 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:03.725230932 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:03.729958057 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:04.007308960 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:04.076200962 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:04.141684055 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:04.200314999 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:04.205087900 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:04.205128908 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:04.209836006 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:06.773384094 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:06.813633919 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:06.919857979 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:07.112360954 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:09.442845106 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:09.447731972 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:09.447824001 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:09.452554941 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:09.733855963 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:09.858982086 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:09.859361887 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:09.860977888 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:09.866246939 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:09.866456032 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:09.871330023 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:14.985917091 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:14.990787983 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:14.993380070 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:14.999058008 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:15.288707018 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:15.419979095 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:15.420155048 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:15.423867941 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:15.428636074 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:15.428759098 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:15.433504105 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:20.705027103 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:20.709914923 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:20.709975958 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:20.714770079 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:21.005300999 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:21.048185110 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:21.133631945 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:21.135843992 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:21.140661001 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:21.141494036 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:21.146226883 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:25.204941988 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:25.211379051 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:25.211484909 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:25.216424942 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:25.507530928 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:25.565383911 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:25.641705990 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:25.661391973 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:25.666218042 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:25.670425892 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:25.675189972 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:30.923607111 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:30.928653955 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:30.936522961 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:30.941356897 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:31.217392921 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:31.268412113 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:31.342211962 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:31.344166040 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:31.348999977 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:31.349121094 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:31.353914022 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:36.642324924 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:36.647241116 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:36.647310972 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:36.652084112 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:36.776948929 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:36.829301119 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:36.905689955 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:36.957401991 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:36.992414951 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:36.994956970 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:36.999783993 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:37.001486063 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:37.006285906 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:41.751558065 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:41.756453037 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:41.757443905 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:41.762236118 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:42.307559967 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:42.307955980 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:42.308020115 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:42.308058977 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:42.308103085 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:42.309396029 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:42.314179897 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:42.314250946 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:42.319046021 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:47.110863924 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:47.117271900 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:47.117474079 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:47.122251987 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:47.414781094 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:47.469937086 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:47.545658112 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:47.547210932 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:47.552047968 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:47.553412914 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:47.558223963 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:50.720339060 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:50.725250959 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:50.725328922 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:50.730128050 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:51.014694929 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:51.065437078 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:51.141623020 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:51.145421982 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:51.150254011 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:51.150425911 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:51.155226946 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:52.236736059 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:52.241657972 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:52.241714001 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:52.246505022 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:52.540052891 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:52.594948053 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:52.670694113 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:52.672527075 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:52.677297115 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:52.677373886 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:52.682132959 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:53.113432884 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:53.118326902 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:53.118510962 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:53.123325109 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:53.472556114 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:53.517421961 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:53.601649046 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:53.603147984 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:53.609921932 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:53.609992981 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:53.619241953 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:55.454663992 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:55.459569931 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:55.459673882 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:55.464426041 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:55.745183945 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:55.799458027 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:55.877710104 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:55.879550934 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:55.884403944 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:14:55.884505987 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:14:55.890958071 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:01.173444033 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:01.178322077 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:01.178431988 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:01.183291912 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:01.460931063 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:01.517442942 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:01.608462095 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:01.613441944 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:01.618196964 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:01.618341923 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:01.623122931 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:03.876615047 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:03.881550074 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:03.885540009 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:03.890353918 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:04.177123070 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:04.219947100 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:04.309688091 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:04.311604977 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:04.316385984 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:04.316432953 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:04.321250916 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:06.767920017 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:06.813726902 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:06.901686907 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:06.954350948 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:09.597448111 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:09.602324963 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:09.602400064 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:09.607228994 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:09.887161970 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:09.939512014 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:10.014954090 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:10.016736031 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:10.021534920 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:10.021584988 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:10.026492119 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:15.317461967 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:15.323390007 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:15.325529099 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:15.330349922 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:15.616863966 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:15.745810032 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:15.747522116 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:15.748997927 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:15.755116940 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:15.755224943 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:15.759979963 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:21.035856009 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:21.040822983 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:21.040915012 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:21.045696974 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:21.351166964 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:21.439562082 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:21.485646963 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:21.488954067 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:21.493808985 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:21.498450041 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:21.503231049 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:26.752120972 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:26.756993055 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:26.757041931 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:26.761791945 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:27.047024965 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:27.097470999 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:27.178478003 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:27.184484959 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:27.189275980 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:27.196486950 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:27.201281071 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:32.470870018 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:32.477144957 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:32.477191925 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:32.483376026 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:32.774122000 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:32.829370022 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:32.921499968 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:32.922873974 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:32.927615881 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:32.927680969 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:32.932410955 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:36.769560099 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:36.813853025 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:36.897600889 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:36.938750982 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:38.192042112 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:38.198169947 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:38.198232889 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:38.204179049 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:38.489660025 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:38.532625914 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:38.609261036 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:38.657608986 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:38.748965979 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:38.753824949 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:38.753890991 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:38.758630991 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:43.908876896 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:43.913762093 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:43.916563988 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:43.921411991 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:44.215054989 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:44.259475946 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:44.327982903 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:44.329180956 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:44.334026098 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:44.334091902 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:44.338829994 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:49.627645969 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:49.632520914 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:49.632596016 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:49.637396097 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:49.931134939 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:49.985667944 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:50.061566114 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:50.065320969 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:50.070079088 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:50.070132971 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:50.074940920 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:51.736099005 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:51.741060972 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:51.741278887 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:51.746157885 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:52.026235104 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:52.079402924 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:52.156631947 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:52.158879995 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:52.163686037 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:52.163742065 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:52.168555021 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:53.737517118 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:53.742341995 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:53.742461920 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:53.747183084 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:54.039112091 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:54.079417944 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:54.169656038 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:54.171360016 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:54.176168919 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:54.176223993 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:54.180969000 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:59.454965115 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:59.459961891 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:59.460041046 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:59.464771032 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:59.743840933 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:59.798166037 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:59.875380993 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:59.876734972 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:59.882275105 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:15:59.882327080 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:15:59.887480021 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:05.193535089 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:05.198717117 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:05.198820114 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:05.203691959 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:05.492372990 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:05.535777092 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:05.622442007 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:05.624283075 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:05.629776955 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:05.631694078 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:05.636496067 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:06.775928974 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:06.829425097 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:06.929907084 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:06.970066071 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:08.829807997 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:08.834798098 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:08.834877968 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:08.839735031 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:09.125678062 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:09.186252117 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:09.250252962 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:09.251979113 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:09.256793022 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:09.256892920 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:09.261684895 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:12.801556110 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:12.806504011 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:12.813455105 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:12.818250895 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:13.095068932 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:13.142083883 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:13.225956917 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:13.228140116 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:13.247155905 CET141449710157.20.182.16192.168.2.6
                                          Jan 7, 2025 17:16:13.248590946 CET497101414192.168.2.6157.20.182.16
                                          Jan 7, 2025 17:16:13.258109093 CET141449710157.20.182.16192.168.2.6
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jan 7, 2025 17:12:09.373075008 CET5938453192.168.2.61.1.1.1
                                          Jan 7, 2025 17:12:09.462213039 CET53593841.1.1.1192.168.2.6
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jan 7, 2025 17:12:09.373075008 CET192.168.2.61.1.1.10xffebStandard query (0)jojo.ath.cxA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jan 7, 2025 17:12:09.462213039 CET1.1.1.1192.168.2.60xffebNo error (0)jojo.ath.cx157.20.182.16A (IP address)IN (0x0001)false
                                          Jan 7, 2025 17:12:10.398056984 CET1.1.1.1192.168.2.60x8a74No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                          Jan 7, 2025 17:12:10.398056984 CET1.1.1.1192.168.2.60x8a74No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                          Jan 7, 2025 17:12:11.176011086 CET1.1.1.1192.168.2.60xde2aNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                          Jan 7, 2025 17:12:11.176011086 CET1.1.1.1192.168.2.60xde2aNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                          Jan 7, 2025 17:12:21.391911030 CET1.1.1.1192.168.2.60x16e5No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                          Jan 7, 2025 17:12:21.391911030 CET1.1.1.1192.168.2.60x16e5No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                          Jan 7, 2025 17:12:35.306011915 CET1.1.1.1192.168.2.60xbee3No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                          Jan 7, 2025 17:12:35.306011915 CET1.1.1.1192.168.2.60xbee3No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                          Jan 7, 2025 17:13:22.724498034 CET1.1.1.1192.168.2.60xc59No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                          Jan 7, 2025 17:13:22.724498034 CET1.1.1.1192.168.2.60xc59No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:11:12:03
                                          Start date:07/01/2025
                                          Path:C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.exe"
                                          Imagebase:0xd90000
                                          File size:1'191'424 bytes
                                          MD5 hash:46441DA6848047284FDD6A2DFA19B802
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2142524766.0000000004336000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2145295489.0000000005E30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.2128611429.00000000032FB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.2128611429.00000000032FB000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.2128611429.0000000003161000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:low
                                          Has exited:true

                                          Target ID:2
                                          Start time:11:12:04
                                          Start date:07/01/2025
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                          Imagebase:0x7e0000
                                          File size:262'432 bytes
                                          MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000002.00000002.4590412855.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:high
                                          Has exited:false

                                          Target ID:3
                                          Start time:11:12:17
                                          Start date:07/01/2025
                                          Path:C:\Windows\System32\wscript.exe
                                          Wow64 process (32bit):false
                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\smcdll.vbs"
                                          Imagebase:0x7ff60aaa0000
                                          File size:170'496 bytes
                                          MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Target ID:4
                                          Start time:11:12:17
                                          Start date:07/01/2025
                                          Path:C:\Users\user\AppData\Local\smcdll.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\AppData\Local\smcdll.exe"
                                          Imagebase:0xfe0000
                                          File size:1'191'424 bytes
                                          MD5 hash:46441DA6848047284FDD6A2DFA19B802
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.2285668016.0000000004583000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000004.00000002.2272656932.0000000003481000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.2272656932.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000004.00000002.2272656932.0000000003A79000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                          Antivirus matches:
                                          • Detection: 100%, Joe Sandbox ML
                                          • Detection: 58%, ReversingLabs
                                          Reputation:low
                                          Has exited:true

                                          Target ID:5
                                          Start time:11:12:18
                                          Start date:07/01/2025
                                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                          Imagebase:0xae0000
                                          File size:262'432 bytes
                                          MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                                          Has elevated privileges:false
                                          Has administrator privileges:false
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000005.00000002.2314408262.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                          Reputation:high
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:11.9%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:3%
                                            Total number of Nodes:297
                                            Total number of Limit Nodes:7
                                            execution_graph 70091 5e18290 70092 5e1829a 70091->70092 70096 5ea0c18 70092->70096 70101 5ea0c08 70092->70101 70093 5e182d8 70097 5ea0c2d 70096->70097 70100 5ea0c43 70097->70100 70106 5ea13ed 70097->70106 70111 5ea12d8 70097->70111 70100->70093 70102 5ea0c18 70101->70102 70103 5ea0c43 70102->70103 70104 5ea12d8 10 API calls 70102->70104 70105 5ea13ed 10 API calls 70102->70105 70103->70093 70104->70103 70105->70103 70107 5ea13f3 70106->70107 70116 5ea2620 70107->70116 70122 5ea2610 70107->70122 70108 5ea10bd 70112 5ea10bd 70111->70112 70113 5ea12e0 70111->70113 70113->70112 70114 5ea2620 10 API calls 70113->70114 70115 5ea2610 10 API calls 70113->70115 70114->70112 70115->70112 70117 5ea2635 70116->70117 70128 5ea289a 70117->70128 70133 5ea2830 70117->70133 70141 5ea2826 70117->70141 70118 5ea2657 70118->70108 70123 5ea2635 70122->70123 70125 5ea289a 10 API calls 70123->70125 70126 5ea2830 10 API calls 70123->70126 70127 5ea2826 10 API calls 70123->70127 70124 5ea2657 70124->70108 70125->70124 70126->70124 70127->70124 70129 5ea283e 70128->70129 70130 5ea289d 70128->70130 70129->70128 70146 5ea2e28 70129->70146 70160 5ea2e18 70129->70160 70130->70118 70134 5ea2836 70133->70134 70135 5ea283e 70134->70135 70139 5ea2e28 10 API calls 70134->70139 70140 5ea2e18 10 API calls 70134->70140 70136 5ea289d 70135->70136 70137 5ea2e28 10 API calls 70135->70137 70138 5ea2e18 10 API calls 70135->70138 70136->70118 70137->70135 70138->70135 70139->70135 70140->70135 70142 5ea2829 70141->70142 70143 5ea289d 70142->70143 70144 5ea2e28 10 API calls 70142->70144 70145 5ea2e18 10 API calls 70142->70145 70143->70118 70144->70142 70145->70142 70147 5ea2e3d 70146->70147 70154 5ea2e5f 70147->70154 70174 5ea3418 70147->70174 70179 5ea3de5 70147->70179 70184 5ea3f35 70147->70184 70189 5ea3fa1 70147->70189 70194 5ea3505 70147->70194 70199 5ea3762 70147->70199 70204 5ea3d1f 70147->70204 70209 5ea440d 70147->70209 70214 5ea3c28 70147->70214 70219 5ea41df 70147->70219 70224 5ea399b 70147->70224 70154->70129 70161 5ea2e2d 70160->70161 70162 5ea399b 2 API calls 70161->70162 70163 5ea3418 4 API calls 70161->70163 70164 5ea3c28 2 API calls 70161->70164 70165 5ea41df 2 API calls 70161->70165 70166 5ea3d1f 2 API calls 70161->70166 70167 5ea440d 2 API calls 70161->70167 70168 5ea2e5f 70161->70168 70169 5ea3762 2 API calls 70161->70169 70170 5ea3fa1 2 API calls 70161->70170 70171 5ea3505 2 API calls 70161->70171 70172 5ea3de5 2 API calls 70161->70172 70173 5ea3f35 2 API calls 70161->70173 70162->70168 70163->70168 70164->70168 70165->70168 70166->70168 70167->70168 70168->70129 70169->70168 70170->70168 70171->70168 70172->70168 70173->70168 70175 5ea3430 70174->70175 70229 5ea4b48 70175->70229 70248 5ea4b41 70175->70248 70176 5ea32f5 70176->70154 70183 5ea3df4 70179->70183 70180 5ea3e65 70180->70154 70358 5eac1b8 70183->70358 70362 5eac1b0 70183->70362 70185 5ea4267 70184->70185 70366 5ead368 70185->70366 70370 5ead370 70185->70370 70186 5ea32f5 70186->70154 70190 5ea3fb4 70189->70190 70374 5eacd20 70190->70374 70378 5eacd1a 70190->70378 70191 5ea32f5 70191->70154 70195 5ea3514 70194->70195 70197 5eac1b8 WriteProcessMemory 70195->70197 70198 5eac1b0 WriteProcessMemory 70195->70198 70196 5ea32f5 70196->70154 70197->70196 70198->70196 70200 5ea4267 70199->70200 70202 5ead368 VirtualAllocEx 70200->70202 70203 5ead370 VirtualAllocEx 70200->70203 70201 5ea32f5 70201->70154 70202->70201 70203->70201 70205 5ea32f5 70204->70205 70206 5ea4241 70204->70206 70205->70154 70207 5ead368 VirtualAllocEx 70206->70207 70208 5ead370 VirtualAllocEx 70206->70208 70207->70205 70208->70205 70210 5ea441a 70209->70210 70212 5eacd1a Wow64SetThreadContext 70210->70212 70213 5eacd20 Wow64SetThreadContext 70210->70213 70211 5ea32f5 70211->70154 70212->70211 70213->70211 70215 5ea3c3b 70214->70215 70217 5eac1b8 WriteProcessMemory 70215->70217 70218 5eac1b0 WriteProcessMemory 70215->70218 70216 5ea32f5 70216->70154 70217->70216 70218->70216 70220 5ea41ec 70219->70220 70221 5ea39c1 70219->70221 70221->70219 70382 5ead9b0 70221->70382 70386 5ead9b8 70221->70386 70225 5ea39a5 70224->70225 70226 5ea41ec 70225->70226 70227 5ead9b8 NtResumeThread 70225->70227 70228 5ead9b0 NtResumeThread 70225->70228 70227->70225 70228->70225 70230 5ea4b5f 70229->70230 70231 5ea4b81 70230->70231 70267 5ea4bb8 70230->70267 70271 5ea5566 70230->70271 70275 5ea53db 70230->70275 70279 5ea4cc6 70230->70279 70283 5ea4c26 70230->70283 70287 5ea550e 70230->70287 70291 5ea4e82 70230->70291 70298 5ea4baa 70230->70298 70302 5ea55a9 70230->70302 70306 5ea4cb7 70230->70306 70310 5ea5075 70230->70310 70314 5ea5413 70230->70314 70318 5ea5010 70230->70318 70325 5ea5139 70230->70325 70329 5ea4dbc 70230->70329 70333 5ea531b 70230->70333 70231->70176 70249 5ea4b48 70248->70249 70250 5ea4b81 70249->70250 70251 5ea4baa 2 API calls 70249->70251 70252 5ea55a9 2 API calls 70249->70252 70253 5ea550e 2 API calls 70249->70253 70254 5ea4e82 4 API calls 70249->70254 70255 5ea4cc6 2 API calls 70249->70255 70256 5ea4c26 2 API calls 70249->70256 70257 5ea5566 2 API calls 70249->70257 70258 5ea53db 2 API calls 70249->70258 70259 5ea531b 2 API calls 70249->70259 70260 5ea4bb8 2 API calls 70249->70260 70261 5ea5139 2 API calls 70249->70261 70262 5ea4dbc 2 API calls 70249->70262 70263 5ea5413 2 API calls 70249->70263 70264 5ea5010 4 API calls 70249->70264 70265 5ea4cb7 2 API calls 70249->70265 70266 5ea5075 2 API calls 70249->70266 70250->70176 70251->70250 70252->70250 70253->70250 70254->70250 70255->70250 70256->70250 70257->70250 70258->70250 70259->70250 70260->70250 70261->70250 70262->70250 70263->70250 70264->70250 70265->70250 70266->70250 70268 5ea4beb 70267->70268 70337 5eaaff8 70268->70337 70341 5eaafec 70268->70341 70272 5ea4c0e 70271->70272 70273 5eaaff8 CreateProcessA 70272->70273 70274 5eaafec CreateProcessA 70272->70274 70273->70272 70274->70272 70276 5ea4c0e 70275->70276 70277 5eaaff8 CreateProcessA 70276->70277 70278 5eaafec CreateProcessA 70276->70278 70277->70276 70278->70276 70280 5ea4c0e 70279->70280 70281 5eaaff8 CreateProcessA 70280->70281 70282 5eaafec CreateProcessA 70280->70282 70281->70280 70282->70280 70284 5ea4c0e 70283->70284 70285 5eaaff8 CreateProcessA 70284->70285 70286 5eaafec CreateProcessA 70284->70286 70285->70284 70286->70284 70288 5ea4c0e 70287->70288 70289 5eaaff8 CreateProcessA 70288->70289 70290 5eaafec CreateProcessA 70288->70290 70289->70288 70290->70288 70292 5ea4e8c 70291->70292 70345 5eab490 70292->70345 70349 5eab480 70292->70349 70293 5ea4c0e 70296 5eaaff8 CreateProcessA 70293->70296 70297 5eaafec CreateProcessA 70293->70297 70296->70293 70297->70293 70299 5ea4bb8 70298->70299 70300 5eaaff8 CreateProcessA 70299->70300 70301 5eaafec CreateProcessA 70299->70301 70300->70299 70301->70299 70303 5ea4c0e 70302->70303 70304 5eaaff8 CreateProcessA 70303->70304 70305 5eaafec CreateProcessA 70303->70305 70304->70303 70305->70303 70307 5ea4c0e 70306->70307 70308 5eaaff8 CreateProcessA 70307->70308 70309 5eaafec CreateProcessA 70307->70309 70308->70307 70309->70307 70311 5ea4c0e 70310->70311 70312 5eaaff8 CreateProcessA 70311->70312 70313 5eaafec CreateProcessA 70311->70313 70312->70311 70313->70311 70315 5ea4c0e 70314->70315 70316 5eaaff8 CreateProcessA 70315->70316 70317 5eaafec CreateProcessA 70315->70317 70316->70315 70317->70315 70319 5ea4ea8 70318->70319 70322 5ea4c0e 70318->70322 70323 5eab480 2 API calls 70319->70323 70324 5eab490 2 API calls 70319->70324 70320 5eaaff8 CreateProcessA 70320->70322 70321 5eaafec CreateProcessA 70321->70322 70322->70320 70322->70321 70323->70322 70324->70322 70326 5ea4c0e 70325->70326 70327 5eaaff8 CreateProcessA 70326->70327 70328 5eaafec CreateProcessA 70326->70328 70327->70326 70328->70326 70330 5ea4c0e 70329->70330 70330->70329 70331 5eaaff8 CreateProcessA 70330->70331 70332 5eaafec CreateProcessA 70330->70332 70331->70330 70332->70330 70334 5ea4c0e 70333->70334 70335 5eaaff8 CreateProcessA 70334->70335 70336 5eaafec CreateProcessA 70334->70336 70335->70334 70336->70334 70338 5eaaffd CreateProcessA 70337->70338 70340 5eab274 70338->70340 70342 5eaaffd CreateProcessA 70341->70342 70344 5eab274 70342->70344 70346 5eab4a5 70345->70346 70347 5eab4bb 70346->70347 70353 5eab7d7 70346->70353 70347->70293 70350 5eab490 70349->70350 70351 5eab7d7 2 API calls 70350->70351 70352 5eab4bb 70350->70352 70351->70352 70352->70293 70354 5eab7e6 70353->70354 70356 5eac1b8 WriteProcessMemory 70354->70356 70357 5eac1b0 WriteProcessMemory 70354->70357 70355 5eab693 70356->70355 70357->70355 70359 5eac204 WriteProcessMemory 70358->70359 70361 5eac29d 70359->70361 70361->70180 70363 5eac1b8 WriteProcessMemory 70362->70363 70365 5eac29d 70363->70365 70365->70180 70367 5ead375 VirtualAllocEx 70366->70367 70369 5ead42c 70367->70369 70369->70186 70371 5ead375 VirtualAllocEx 70370->70371 70373 5ead42c 70371->70373 70373->70186 70375 5eacd69 Wow64SetThreadContext 70374->70375 70377 5eacde1 70375->70377 70377->70191 70379 5eacd20 Wow64SetThreadContext 70378->70379 70381 5eacde1 70379->70381 70381->70191 70383 5ead9bd NtResumeThread 70382->70383 70385 5eada58 70383->70385 70385->70221 70387 5ead9bd NtResumeThread 70386->70387 70389 5eada58 70387->70389 70389->70221 70046 5eaa4a8 70047 5eaa4f7 NtProtectVirtualMemory 70046->70047 70049 5eaa56f 70047->70049 70006 5cce7c8 70007 5cce80c VirtualAlloc 70006->70007 70009 5cce879 70007->70009 70050 30d65e8 70051 30d6605 70050->70051 70052 30d6615 70051->70052 70056 5cc2ab4 70051->70056 70059 5cc11c5 70051->70059 70063 5cc0217 70051->70063 70066 5ccd190 70056->70066 70060 5cc11e4 70059->70060 70062 5ccd190 VirtualProtect 70060->70062 70061 5cc1208 70062->70061 70065 5ccd190 VirtualProtect 70063->70065 70064 5cc01d5 70065->70064 70068 5ccd1b7 70066->70068 70070 5ccd690 70068->70070 70071 5ccd6d9 VirtualProtect 70070->70071 70073 5cc01d5 70071->70073 70074 2f4d01c 70076 2f4d034 70074->70076 70075 2f4d08f 70076->70075 70078 5ccdd18 70076->70078 70079 5ccdd71 70078->70079 70082 5cce278 70079->70082 70080 5ccdda6 70083 5cce2a5 70082->70083 70084 5ccd190 VirtualProtect 70083->70084 70086 5cce43b 70083->70086 70085 5cce42c 70084->70085 70085->70080 70086->70080 70010 5e18148 70011 5e18132 70010->70011 70014 5c96e80 70011->70014 70019 5c96e7d 70011->70019 70015 5c96e95 70014->70015 70016 5c96eab 70015->70016 70024 5c982fe 70015->70024 70029 5c98a04 70015->70029 70016->70011 70020 5c96e95 70019->70020 70021 5c96eab 70020->70021 70022 5c982fe 2 API calls 70020->70022 70023 5c98a04 2 API calls 70020->70023 70021->70011 70022->70021 70023->70021 70025 5c98a0a 70024->70025 70034 5ea0040 70025->70034 70038 5ea0021 70025->70038 70030 5c98a0f 70029->70030 70032 5ea0040 CopyFileA 70030->70032 70033 5ea0021 CopyFileA 70030->70033 70031 5c98a9b 70032->70031 70033->70031 70036 5ea009c 70034->70036 70035 5ea0194 CopyFileA 70037 5ea01cd 70035->70037 70036->70035 70036->70036 70039 5ea0040 CopyFileA 70038->70039 70041 5ea01cd 70039->70041 70390 5e1819a 70391 5e18132 70390->70391 70392 5c96e7d 2 API calls 70391->70392 70393 5c96e80 2 API calls 70391->70393 70392->70391 70393->70391
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4
                                            • API String ID: 0-4088798008
                                            • Opcode ID: 17941b17e65b39b62616a05e7073d6a626540bac47baac0c7fa386cad40b70c9
                                            • Instruction ID: 982c087006311fca8aa395d8e968f0c5f6df2c347e721257372f39996cb77697
                                            • Opcode Fuzzy Hash: 17941b17e65b39b62616a05e7073d6a626540bac47baac0c7fa386cad40b70c9
                                            • Instruction Fuzzy Hash: 0BB21974A00218CFEB14CFA5C994BADBBB6FB48304F145199E946AB3A4DB70DD81CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 8
                                            • API String ID: 0-4194326291
                                            • Opcode ID: db30e6e9dbca863d93795b186cbefbf8439d7162845fdbe6febde141df8f1938
                                            • Instruction ID: 0cebd0805b9f77e25e5accca5d9520d22c55e837b8a7d986f1448b2072a0b1ad
                                            • Opcode Fuzzy Hash: db30e6e9dbca863d93795b186cbefbf8439d7162845fdbe6febde141df8f1938
                                            • Instruction Fuzzy Hash: 2A52D775E00229CFDB64DF69C854ADAB7B1FB99300F1086AAD94DA7350DB70AE81CF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 4
                                            • API String ID: 0-4088798008
                                            • Opcode ID: b55c5a4925f8a0ac3fe3c7107a07fed364b6fe52ae6d4a9e36d89a7e57eb7d29
                                            • Instruction ID: 6a82875b4ba3aea33dad188f6395dd9e90ff4c4f8da4f8bd394314dbbdae2287
                                            • Opcode Fuzzy Hash: b55c5a4925f8a0ac3fe3c7107a07fed364b6fe52ae6d4a9e36d89a7e57eb7d29
                                            • Instruction Fuzzy Hash: 9D221C74A00218CFEB14DFA4C994BADBBB6FF48304F1491A9E949AB394DB709D81CF54
                                            APIs
                                            • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05EAA55D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: MemoryProtectVirtual
                                            • String ID:
                                            • API String ID: 2706961497-0
                                            • Opcode ID: 32ee0769820b3a4826bbf26f9cf326bc6f0f498f7ba10e87a7552a0f4ce21a63
                                            • Instruction ID: e9f51fe6d2c94f34c4fffe684d73ab66e391d0cdf291c57a1796ed3ac0026861
                                            • Opcode Fuzzy Hash: 32ee0769820b3a4826bbf26f9cf326bc6f0f498f7ba10e87a7552a0f4ce21a63
                                            • Instruction Fuzzy Hash: D63198B9D002589FDF10DFAAC981ADEFBB1BF49310F10A42AE819B7200D775A901CF58
                                            APIs
                                            • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05EAA55D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: MemoryProtectVirtual
                                            • String ID:
                                            • API String ID: 2706961497-0
                                            • Opcode ID: 64ec7bd07aa1725a1738a47cf6c2585a1dbef79ad324461203cf16731b7e0df7
                                            • Instruction ID: 5b10eec45cc551fb6be6e1c34569bee39e599d8d887cda82f2139782d8de2214
                                            • Opcode Fuzzy Hash: 64ec7bd07aa1725a1738a47cf6c2585a1dbef79ad324461203cf16731b7e0df7
                                            • Instruction Fuzzy Hash: 503188B5D042599FCF10CFA9D980A9EFBB1BF49310F10A42AE819B7200D775A941CF58
                                            APIs
                                            • NtResumeThread.NTDLL(?,?), ref: 05EADA46
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: 9a1805993b4a8e79e4c093e17ece182386c76dfc203fcfb6b5f93218022f0b21
                                            • Instruction ID: b800c6516d266e0838c15d62381a71ab507203eb9999fa9a2d126a27b30a0d65
                                            • Opcode Fuzzy Hash: 9a1805993b4a8e79e4c093e17ece182386c76dfc203fcfb6b5f93218022f0b21
                                            • Instruction Fuzzy Hash: EB31C8B5D052199FDB10CFAAD980A9EFBF1BB49310F24942AE815B7200D775A901CF94
                                            APIs
                                            • NtResumeThread.NTDLL(?,?), ref: 05EADA46
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: ResumeThread
                                            • String ID:
                                            • API String ID: 947044025-0
                                            • Opcode ID: ed196a08ff9ebe2abf4d0986f88fc3b93d18e206ef1f5f9273f44c6005946046
                                            • Instruction ID: 59e9671515877442129771c5705d806e6ae59781233b063d9f54e8089d179893
                                            • Opcode Fuzzy Hash: ed196a08ff9ebe2abf4d0986f88fc3b93d18e206ef1f5f9273f44c6005946046
                                            • Instruction Fuzzy Hash: 8F31C8B5D052199FDB10CFA9D980ADEFBF1BB48310F24A42AE815BB200D778A901CF94
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID: 0-3916222277
                                            • Opcode ID: a3fabd04050d586ef9dc1f0798012a3189358001e100920a17cc9ca97155ddbb
                                            • Instruction ID: 50bb547e43ccbe693f134b74268820316fd36567eab651f06f47c0ca68348fb9
                                            • Opcode Fuzzy Hash: a3fabd04050d586ef9dc1f0798012a3189358001e100920a17cc9ca97155ddbb
                                            • Instruction Fuzzy Hash: 7CD11670D09229CFEB00CF99C544BFEBBFABB89304F10A129D459A7249D7B85985CF85
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: H!
                                            • API String ID: 0-966533619
                                            • Opcode ID: 4e5c87f4ea5f81fa0354d9c47595acf7b2a94184a12afdc20a6ae189796b313c
                                            • Instruction ID: c61a3eca173849bc6134f3bfff97954a66f735c84c825c3b30329648d814d00e
                                            • Opcode Fuzzy Hash: 4e5c87f4ea5f81fa0354d9c47595acf7b2a94184a12afdc20a6ae189796b313c
                                            • Instruction Fuzzy Hash: 4EC13871A04218CFDB54CFA9D544BEEB7F2FB49304F209029D44AAB289DB749D81CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: !
                                            • API String ID: 0-2657877971
                                            • Opcode ID: 93a3e9c598f35b3d07140610b8161c9e06244543ba205d9e48ba2bcbe9ad6f94
                                            • Instruction ID: 0371f5b3f2c2fe4461cdc85e286f20c8f98edfbce1c54a1a88d3d48a22f10c53
                                            • Opcode Fuzzy Hash: 93a3e9c598f35b3d07140610b8161c9e06244543ba205d9e48ba2bcbe9ad6f94
                                            • Instruction Fuzzy Hash: 92B10570D45228CBDB00DFAAD855BEEBBF2FB49304F10E11AD465B7248E7B458858F68
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: H!
                                            • API String ID: 0-966533619
                                            • Opcode ID: 6caf3a9566de89497ddc445587bf770e1808ad43f27aaadcc0598bef567c975e
                                            • Instruction ID: 67c5509be5b05d3b1297dda4271833145a325489b483ec710271e10b08eb9060
                                            • Opcode Fuzzy Hash: 6caf3a9566de89497ddc445587bf770e1808ad43f27aaadcc0598bef567c975e
                                            • Instruction Fuzzy Hash: 0DA14770A41218CFDB54CFA9E944BAE77F2FB48304F209069D44AAB285DB749D81CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: h
                                            • API String ID: 0-2439710439
                                            • Opcode ID: 326fc2392304b0a02e111dcca8f75cb608b4eb6b573e7fe358857a6315944510
                                            • Instruction ID: 73c100a6660e1ee35e08c4a44c420db4bc2721093d50dec82e529699614e3b69
                                            • Opcode Fuzzy Hash: 326fc2392304b0a02e111dcca8f75cb608b4eb6b573e7fe358857a6315944510
                                            • Instruction Fuzzy Hash: EF712B75E00219CFEB14DF69D850ADAB7B2FF89300F1482AAD55DA7254DB70AE81CF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 914a0c8ae8c1d944c92cc66cde306c2551a306ad90f632ec55ba851205cc8277
                                            • Instruction ID: 5efd3198c227e0ef3b9a14c16f3d2b7849f5ab3dc93eef96ce1329d8faae8efa
                                            • Opcode Fuzzy Hash: 914a0c8ae8c1d944c92cc66cde306c2551a306ad90f632ec55ba851205cc8277
                                            • Instruction Fuzzy Hash: C34107B1D05218CBEB18CFAAC8447EEBBF2FB88314F14D0AAC559A7258DB744A45CF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 4056077db5c68407e4dcb843b4322ea37a0f30b278fe508d4b061bd173e91916
                                            • Instruction ID: ab12e5cebe4037e3d141379b0633a475dc72df0d12832086bd8d1710f77f8654
                                            • Opcode Fuzzy Hash: 4056077db5c68407e4dcb843b4322ea37a0f30b278fe508d4b061bd173e91916
                                            • Instruction Fuzzy Hash: 48310CB1D05218CBEB18CFAAC9047EEB7F6FB88314F14D0AAC549A7258DB744A458F50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 691ac4ba454461845edd84cb7fa5323bb7b6a1676ca2d8d412cf476ab59ec8a5
                                            • Instruction ID: a5c85defd9f3be16de4a284be435038b3fe01fde2c992d7c847de3fb148f0010
                                            • Opcode Fuzzy Hash: 691ac4ba454461845edd84cb7fa5323bb7b6a1676ca2d8d412cf476ab59ec8a5
                                            • Instruction Fuzzy Hash: D3A29175A01228CFDB65CF69C984A9DBBF2FF89304F1581E9D509AB225DB319E81CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c725eacf55f3219889e68d5766f93418555ed8d45cfcd498da863d9cf21950a5
                                            • Instruction ID: 6bd7594cdeaef68a48e5fd31070b1b5ae973be5b5577669d3e98daaecf7e88e8
                                            • Opcode Fuzzy Hash: c725eacf55f3219889e68d5766f93418555ed8d45cfcd498da863d9cf21950a5
                                            • Instruction Fuzzy Hash: 7D325A74A006168FDB18CFA9C494BAEFBF2FF88310F248929D55A97351CB74A941CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 73d553de74364b1621e6df939b5e96d1e7b8548d19653becd28d3a021960fe76
                                            • Instruction ID: 5062d617024cd6853bbbefa2297ceb9989d5c47668b63cd3d431282895a6f6c4
                                            • Opcode Fuzzy Hash: 73d553de74364b1621e6df939b5e96d1e7b8548d19653becd28d3a021960fe76
                                            • Instruction Fuzzy Hash: 16021474E05218CFDB64CF69D854BEAB7F2FB89300F1090A9D849A7245DB749E85CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c8466f4fc049509df05a36c278c9b0a3b34b71dc4692d75456c90ecd28f9dcba
                                            • Instruction ID: 466b6c6de560e50bf10c7ef77144e027245204e1b6ddb68a381e5181885886d4
                                            • Opcode Fuzzy Hash: c8466f4fc049509df05a36c278c9b0a3b34b71dc4692d75456c90ecd28f9dcba
                                            • Instruction Fuzzy Hash: DB021474E05218CFDB64CF69D854BAAB7F2FB89300F1090AAD849A7345DB749E85CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bacb15b6d09e21d2acbd6d358fb038f06b65ec915f74da42c8582cca9ffc6e33
                                            • Instruction ID: 201ff9bfd70a38058a9877868d66477f4dc06e7b04e50f05f56a6538f6239f6e
                                            • Opcode Fuzzy Hash: bacb15b6d09e21d2acbd6d358fb038f06b65ec915f74da42c8582cca9ffc6e33
                                            • Instruction Fuzzy Hash: 3BF1F174E05218CFDB60CF69D994BA9BBF2FB49300F1090AAD849E7245DB749E85CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ea74c4927db9ed3910c8b7f2ce50c845488ea3136340a8fa01c2f98ffefa21a1
                                            • Instruction ID: f532da93d0a8545392da9ad46b61c4065f89b384cb3c4355e07aba04afe7203a
                                            • Opcode Fuzzy Hash: ea74c4927db9ed3910c8b7f2ce50c845488ea3136340a8fa01c2f98ffefa21a1
                                            • Instruction Fuzzy Hash: B7E1EAB4E04218CFDB18CF6AD948BADBBF2FB89305F1094A9D40AB7254DB749985CF05
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a6d8424c0e83418aad43a9815097cb34637d443c86c988240119baf5ad4f8a93
                                            • Instruction ID: 5d8ccc75a77621d07ce446f9c663a2bc30596d2b1e263e4f771e04e113e9906d
                                            • Opcode Fuzzy Hash: a6d8424c0e83418aad43a9815097cb34637d443c86c988240119baf5ad4f8a93
                                            • Instruction Fuzzy Hash: 23E1DAB4E04218CFDB18CF6AD948BAEBBF2FB49305F1084A9D40AB7254DB749985CF05
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 463dfc761522920eac8e114ee0c18abde7b18f165984428f8a3351eecb671cb9
                                            • Instruction ID: 466730bb4c7589be71a40fbf9c08399d205521c902f0c089fe71d83c1c78a327
                                            • Opcode Fuzzy Hash: 463dfc761522920eac8e114ee0c18abde7b18f165984428f8a3351eecb671cb9
                                            • Instruction Fuzzy Hash: 7BC12774E05218CFEB18CF69D984BAEBBB2FB89304F10A169D449AB344DB346D85CF05
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1d95462153be32f2e385243a2099d66b18eb93bdbd3a67499398eb259848778d
                                            • Instruction ID: acd3af28bbd6dbc35852c9830e8b236000a86b463b066fb7aa9734fe8fc14605
                                            • Opcode Fuzzy Hash: 1d95462153be32f2e385243a2099d66b18eb93bdbd3a67499398eb259848778d
                                            • Instruction Fuzzy Hash: 46C12674E05218CFEB18CF69D984BAEBBB2FB89304F10A169D449AB244DB346D85CF05
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b7232b4842cbed361fc41a7d3c743626426e35982c726b3e8d51abb370291ec2
                                            • Instruction ID: e549c81f20c1409cdf24853a4bd12a40bb512bb955e8ad3a62d7d5e4c0e624a6
                                            • Opcode Fuzzy Hash: b7232b4842cbed361fc41a7d3c743626426e35982c726b3e8d51abb370291ec2
                                            • Instruction Fuzzy Hash: 10D1AC74E01219CFDB54DFA9D890A9DBBB2FF89300F2485A9D409AB365DB34AD81CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 33557bd17fae6b1cd6d69c96ceaedf1491591c17261bea5ab92d68222f1c09b6
                                            • Instruction ID: 9258bd611a414465e9dfb033f2319d81124aa142f2906fc390658911a3f7b3d3
                                            • Opcode Fuzzy Hash: 33557bd17fae6b1cd6d69c96ceaedf1491591c17261bea5ab92d68222f1c09b6
                                            • Instruction Fuzzy Hash: E2C118B4E05208DFDB08CFAAE988B9EBBF2FB49304F108469D419A7254DB749D85CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 014aeb0ad95a0b8ec9ab4bf05b5b38d354b6a8fedf08ac7ee80f9577c32629e6
                                            • Instruction ID: e79e0b8def1e5572b1de1592ca7b6af68fbb20b0afa2ea33136cb5746416254c
                                            • Opcode Fuzzy Hash: 014aeb0ad95a0b8ec9ab4bf05b5b38d354b6a8fedf08ac7ee80f9577c32629e6
                                            • Instruction Fuzzy Hash: CDC118B4E05208DFDB08CFAAE588B9EBBF2FB89304F108469D419A7254DB749D85CF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 68e078d2992f20994a1db38262b506c6a7ec170e9ce8eeba38301f5f7acb5d71
                                            • Instruction ID: c84fe624c706edc0c5e20057ca0e3842f012b11fa27449195b6d7aa79ebdde8e
                                            • Opcode Fuzzy Hash: 68e078d2992f20994a1db38262b506c6a7ec170e9ce8eeba38301f5f7acb5d71
                                            • Instruction Fuzzy Hash: 7DA11370E05218CFDB14CFAAD984BADBBF3FB88704F20A069D849A7245DB745981CF08
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 244369b49e5d24e2d57ad255d1465450826796643e20f11b9742e5727b6c8153
                                            • Instruction ID: 04ca886d56d8dd210d83884ae814c56bee33bd32ad919cb769864e90eac7077a
                                            • Opcode Fuzzy Hash: 244369b49e5d24e2d57ad255d1465450826796643e20f11b9742e5727b6c8153
                                            • Instruction Fuzzy Hash: E8A10270E05218CFDB14CFAAD984BADBBF2FB88704F20906AD849A7355DB745985CF04
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 540d192a384056a6a9cdda6e990f74b4b00c32cbde4627b40419b20f43ab8dbd
                                            • Instruction ID: 0a32f321cae5bdc56c5df4939442431eba9d4868cb230ed02b2db64e16764a5a
                                            • Opcode Fuzzy Hash: 540d192a384056a6a9cdda6e990f74b4b00c32cbde4627b40419b20f43ab8dbd
                                            • Instruction Fuzzy Hash: 6CB13B70E01218CFEB24CF69D884BADBBF2FB89304F1090A9D849A7651DB749D84CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7e2524801c7af1d059ec1a6123d5d114937323c52a2e13f49cb9623900f2ccab
                                            • Instruction ID: 4b369e79aa077429017b375c22a53161e68a43cbd2f1d72b1856d612d9f1defc
                                            • Opcode Fuzzy Hash: 7e2524801c7af1d059ec1a6123d5d114937323c52a2e13f49cb9623900f2ccab
                                            • Instruction Fuzzy Hash: 29A11770E01218CFEB24CF69D984BADBBF2FB89304F1091A9D849A7651DB749D85CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0b486b8117f09dfb5e30a381a94136b587e7f4ae555f4b3294a421b10a8fbd1d
                                            • Instruction ID: 35bb4ea8a1abd1b5b1fc1fe268dd5693a0cacf18045844996731577f1e05beb7
                                            • Opcode Fuzzy Hash: 0b486b8117f09dfb5e30a381a94136b587e7f4ae555f4b3294a421b10a8fbd1d
                                            • Instruction Fuzzy Hash: 52A1BE74A01259CFDB58CFA9D884A9DBBF2FF89300F1485A9D409AB365DB34AD85CF10
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c6cf454de5c4d61f6d5b12867273a4eb7558ff864d39263595a339d06f75224a
                                            • Instruction ID: 51c224bf9409df8a0a09f5eadb6a6bf03264faf9d098d4215bfca44b2f1a9c59
                                            • Opcode Fuzzy Hash: c6cf454de5c4d61f6d5b12867273a4eb7558ff864d39263595a339d06f75224a
                                            • Instruction Fuzzy Hash: E4815B74E05258CFDB14CFA9D888BAEBBF2FB89704F109469D109A7284CB749D85CF94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bb48ce4054219ce13aa9d2a5d9d98cbda33934faaf6683eb51dcc059f320073c
                                            • Instruction ID: 6e7b9fe3ee6b19101fb695e9252b69fa0d4f7d5e95ccbe3f7fbd144bb3990e3f
                                            • Opcode Fuzzy Hash: bb48ce4054219ce13aa9d2a5d9d98cbda33934faaf6683eb51dcc059f320073c
                                            • Instruction Fuzzy Hash: 8EA12870E01218CFEB24CF69D884BADBBF2FB89304F1091A9D849A7651DB749D84CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 79178a030e4032c3b0e94238fd4da310ba2bf72e22b41821f70a5533288b2ef8
                                            • Instruction ID: 0caa823ce62bfbc7274ab9dacc4edb917f92c9ac21f7966bb16414d6983fd861
                                            • Opcode Fuzzy Hash: 79178a030e4032c3b0e94238fd4da310ba2bf72e22b41821f70a5533288b2ef8
                                            • Instruction Fuzzy Hash: CF51E534B02309CBDB14DA7A884477E7AF6BBC9310F2445AAD50ADB3C8DE71DD418792
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 16869761cb1c69dbc99072fa12583320cf0ae10b05b4549d5abe097d37c65647
                                            • Instruction ID: 80805ea45de72f7f8681b04bb46834626632d9fc3b6ad7ab742bd6e82182be09
                                            • Opcode Fuzzy Hash: 16869761cb1c69dbc99072fa12583320cf0ae10b05b4549d5abe097d37c65647
                                            • Instruction Fuzzy Hash: 7C71F974E41609CFE748DF6BE84069EBBF2FBD8304F04C529D018AB265EBB4A945CB54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e27ac42fb55aa54d01dbc50413c5248ff8072a4aa37a4949e6ddd2b2d1853d1c
                                            • Instruction ID: c518cd43aebcc2fbe0a3d731b7b957d8dd968a44b15734d8940eed61bc0c6a1b
                                            • Opcode Fuzzy Hash: e27ac42fb55aa54d01dbc50413c5248ff8072a4aa37a4949e6ddd2b2d1853d1c
                                            • Instruction Fuzzy Hash: DF71F874E41609CFE748DF6BE84069EBBF2FBD8304F04C529C018AB265EBB4A945CB54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 10ad60e4f534fcbe454fde66c27edc383adddd406f8fa9d607d2c9f86f7e78ae
                                            • Instruction ID: f2c575b29a2b83d382903056f72a50516154cdbe2e0c0f085aa0d194eb4adc4b
                                            • Opcode Fuzzy Hash: 10ad60e4f534fcbe454fde66c27edc383adddd406f8fa9d607d2c9f86f7e78ae
                                            • Instruction Fuzzy Hash: 63512774A4020ADFDB48CFA9D9946EEBBF2FB88300F60D129D409E7344D774A981CB94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 498b8cfa726e173f78560a8eea87661ea39077df215258696a15565c8c087d4f
                                            • Instruction ID: 720b92b70252c511ee0a5d2eaa098e2b1a5022b281eaa08ccd5255dc19beb7b9
                                            • Opcode Fuzzy Hash: 498b8cfa726e173f78560a8eea87661ea39077df215258696a15565c8c087d4f
                                            • Instruction Fuzzy Hash: 5D3116B1D052189BEB19CFAAC88479DFBF6AF88300F14C1AAD809A7254DB744A45CF50

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 5bed5f9-5bed608 1 5bed515-5bed51b 0->1 2 5bed51d 1->2 3 5bed524-5bed525 1->3 4 5bed75f-5bed7b9 2->4 5 5bed7fd-5bed81e 2->5 6 5bed60d-5bed60e 2->6 7 5bed6c8-5bed6d5 2->7 8 5bed5f6-5bed5f7 2->8 9 5bed563-5bed564 2->9 10 5bed533-5bed557 2->10 11 5bed5f0-5bed7ea 2->11 3->8 3->10 43 5bed7bc call 5bedb3a 4->43 44 5bed7bc call 5bedb92 4->44 5->1 14 5bed56c-5bed572 6->14 7->1 13 5bed585-5bed58b 8->13 9->14 10->1 15 5bed559-5bed561 10->15 21 5bed727-5bed75a 11->21 22 5bed7f0-5bed7f8 11->22 19 5bed58d 13->19 20 5bed594-5bed5ad 13->20 16 5bed57b-5bed583 14->16 17 5bed574 14->17 15->1 16->1 16->13 17->4 17->10 17->11 17->13 24 5bed6ac-5bed6bd 17->24 25 5bed8bb-5bed8f5 17->25 26 5bed839-5bed849 17->26 27 5bed897-5bed89e 17->27 28 5bed654-5bed68b 17->28 29 5bed712-5bed722 17->29 30 5bed823-5bed834 17->30 19->4 19->11 19->24 19->26 19->27 19->28 19->29 20->1 32 5bed5b3-5bed5bb 20->32 21->1 21->4 22->1 24->1 25->1 26->1 28->1 29->1 30->1 32->1 32->11 41 5bed7c2-5bed7d3 41->1 43->41 44->41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$$%
                                            • API String ID: 0-3621480653
                                            • Opcode ID: 782f7729525f6530aa7ab30d88da1c5f26304a28c4d3e9569474c8ef2612e1a3
                                            • Instruction ID: 57765d520c24107a3b7a2efe565df8186ef53b4d0a364da1ad12c154b346f8a6
                                            • Opcode Fuzzy Hash: 782f7729525f6530aa7ab30d88da1c5f26304a28c4d3e9569474c8ef2612e1a3
                                            • Instruction Fuzzy Hash: 6C61E178A44208DFDB00CFA8D594AEEBBF2FF49308F148159E919AB344C7B4A946CF55

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 45 5e28058-5e280aa 48 5e27ae0-5e27ae6 45->48 49 5e280b0-5e280b8 45->49 51 5e27ae8 48->51 52 5e27aef-5e27af0 48->52 49->48 50 5e28127-5e28144 49->50 50->48 53 5e2814a-5e28150 50->53 54 5e27dda-5e28039 51->54 55 5e27cc8-5e27cee call 5e2b1e0 51->55 56 5e27b39-5e27b3a 51->56 52->54 52->56 53->48 54->48 58 5e2803f-5e28047 54->58 60 5e27cf4-5e27d06 55->60 56->50 58->48
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: !$,$.
                                            • API String ID: 0-163224109
                                            • Opcode ID: c25dacae1526e8f8b332da59cefae13a69d382f8af4eb5ce8d3d9682f3cb738d
                                            • Instruction ID: 2850badd6cdd5ff044875c309f5479e9ee4b6aba66122979bbad0125dca544db
                                            • Opcode Fuzzy Hash: c25dacae1526e8f8b332da59cefae13a69d382f8af4eb5ce8d3d9682f3cb738d
                                            • Instruction Fuzzy Hash: 6831CF74E05228CBEB10CFA8D944BEEB7F2FB48354F1090A9D449A7244D7759E84CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 62 5e27fe6-5e28006 63 5e27ae0-5e27ae6 62->63 64 5e2800c-5e28014 62->64 65 5e27ae8 63->65 66 5e27aef-5e27af0 63->66 64->63 67 5e28019-5e28039 64->67 69 5e27dda-5e27ddb 65->69 70 5e27cc8-5e27cee call 5e2b1e0 65->70 71 5e27b39-5e28144 65->71 66->69 66->71 67->63 68 5e2803f-5e28047 67->68 68->63 69->67 75 5e27cf4-5e27d06 70->75 71->63 73 5e2814a-5e28150 71->73 73->63
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,$4$6
                                            • API String ID: 0-4034081794
                                            • Opcode ID: 9703b0e5d426023227f081a47fe17d6a048f828bac8eef5bd4ae2196aeb542bc
                                            • Instruction ID: 7e5237e6a16e5bf9aa4240cf1fd2c5501630695101a3f9ebb141c3b24f92bf76
                                            • Opcode Fuzzy Hash: 9703b0e5d426023227f081a47fe17d6a048f828bac8eef5bd4ae2196aeb542bc
                                            • Instruction Fuzzy Hash: 5021F3B0D05218CBEB10CF98D944BEEBBF2FB08369F2091A5D449AB288C3354E84CF14

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 77 5bed4b8-5bed4dd 78 5bed4df 77->78 79 5bed4e4-5bed50d 77->79 78->79 81 5bed50f-5bed512 79->81 82 5bed515-5bed51b 81->82 83 5bed51d 82->83 84 5bed524-5bed525 82->84 85 5bed75f-5bed7b9 83->85 86 5bed7fd-5bed81e 83->86 87 5bed60d-5bed60e 83->87 88 5bed6c8-5bed6d5 83->88 89 5bed5f6-5bed5f7 83->89 90 5bed563-5bed564 83->90 91 5bed533-5bed557 83->91 92 5bed5f0-5bed7ea 83->92 84->89 84->91 123 5bed7bc call 5bedb3a 85->123 124 5bed7bc call 5bedb92 85->124 86->81 95 5bed56c-5bed572 87->95 88->82 94 5bed585-5bed58b 89->94 90->95 91->82 96 5bed559-5bed561 91->96 102 5bed727-5bed75a 92->102 103 5bed7f0-5bed7f8 92->103 100 5bed58d 94->100 101 5bed594-5bed5ad 94->101 97 5bed57b-5bed583 95->97 98 5bed574 95->98 96->82 97->82 97->94 98->85 98->91 98->92 98->94 105 5bed6ac-5bed6bd 98->105 106 5bed8bb-5bed8f5 98->106 107 5bed839-5bed849 98->107 108 5bed897-5bed89e 98->108 109 5bed654-5bed68b 98->109 110 5bed712-5bed722 98->110 111 5bed823-5bed834 98->111 100->85 100->92 100->105 100->107 100->108 100->109 100->110 101->82 112 5bed5b3-5bed5bb 101->112 102->82 102->85 103->82 105->82 106->82 107->82 109->82 110->82 111->82 112->82 112->92 121 5bed7c2-5bed7d3 121->82 123->121 124->121
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$
                                            • API String ID: 0-157503211
                                            • Opcode ID: b1019fd152d2b2664a1027fa23dbb0eb04955808f917fe952f263818d598ee8d
                                            • Instruction ID: ff2dfcc1c482a6b6cab6215a5a7990196e60017acd53a892acb8cd59c4e6845f
                                            • Opcode Fuzzy Hash: b1019fd152d2b2664a1027fa23dbb0eb04955808f917fe952f263818d598ee8d
                                            • Instruction Fuzzy Hash: 1E91E274A44208DFDB00CFA9D954AEEBBF2FF49304F148169E919AB344CBB4A9468F54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 125 5c9dfd0-5c9dfff 126 5c9e001 125->126 127 5c9e006-5c9e03b 125->127 126->127 130 5c9e041-5c9e04a 127->130 131 5c9e04c 130->131 132 5c9e053-5c9e054 130->132 133 5c9e059-5c9e07c 131->133 134 5c9e1cd-5c9e292 131->134 135 5c9e089-5c9e0e9 131->135 136 5c9e135-5c9e142 131->136 137 5c9e185-5c9e189 131->137 138 5c9e145-5c9e180 131->138 139 5c9e1c7-5c9e1c8 131->139 132->133 132->134 133->130 140 5c9e07e-5c9e087 133->140 157 5c9e29d-5c9e2a6 134->157 142 5c9e0f4-5c9e11f 135->142 141 5c9e18f-5c9e1b1 137->141 137->142 138->130 139->136 140->130 141->130 146 5c9e1b7-5c9e1c2 141->146 142->130 143 5c9e125-5c9e130 142->143 143->130 146->130 158 5c9e2a8 157->158 159 5c9e2af-5c9e5a4 157->159 158->133 158->134 158->135 158->136 158->137 158->138 158->139 161 5c9e5aa-5c9e5cc 159->161 162 5c9e8af-5c9e8c9 call 5c9f551 159->162 161->157 163 5c9e5d2-5c9e5dd 161->163 165 5c9e8cf-5c9e8e9 162->165 163->157 165->157
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$"
                                            • API String ID: 0-3758156766
                                            • Opcode ID: e8670aad6c51c6d7ac9c1b087770758e4c93fe2d95e5324bf72b83aa1f7ef8b5
                                            • Instruction ID: 49e57b32ef4db0a73844f60aa7345d8899422c457739f153d16e4ef8060baaed
                                            • Opcode Fuzzy Hash: e8670aad6c51c6d7ac9c1b087770758e4c93fe2d95e5324bf72b83aa1f7ef8b5
                                            • Instruction Fuzzy Hash: 38911574E05228CFEB64CF29D948BAABBB6FB99300F0090E9D50DA7241DB745E85CF05

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 167 5bed4a8-5bed4dd 168 5bed4df 167->168 169 5bed4e4-5bed50d 167->169 168->169 171 5bed50f-5bed512 169->171 172 5bed515-5bed51b 171->172 173 5bed51d 172->173 174 5bed524-5bed525 172->174 175 5bed75f-5bed7b9 173->175 176 5bed7fd-5bed81e 173->176 177 5bed60d-5bed60e 173->177 178 5bed6c8-5bed6d5 173->178 179 5bed5f6-5bed5f7 173->179 180 5bed563-5bed564 173->180 181 5bed533-5bed557 173->181 182 5bed5f0-5bed7ea 173->182 174->179 174->181 213 5bed7bc call 5bedb3a 175->213 214 5bed7bc call 5bedb92 175->214 176->171 185 5bed56c-5bed572 177->185 178->172 184 5bed585-5bed58b 179->184 180->185 181->172 186 5bed559-5bed561 181->186 192 5bed727-5bed75a 182->192 193 5bed7f0-5bed7f8 182->193 190 5bed58d 184->190 191 5bed594-5bed5ad 184->191 187 5bed57b-5bed583 185->187 188 5bed574 185->188 186->172 187->172 187->184 188->175 188->181 188->182 188->184 195 5bed6ac-5bed6bd 188->195 196 5bed8bb-5bed8f5 188->196 197 5bed839-5bed849 188->197 198 5bed897-5bed89e 188->198 199 5bed654-5bed68b 188->199 200 5bed712-5bed722 188->200 201 5bed823-5bed834 188->201 190->175 190->182 190->195 190->197 190->198 190->199 190->200 191->172 202 5bed5b3-5bed5bb 191->202 192->172 192->175 193->172 195->172 196->172 197->172 199->172 200->172 201->172 202->172 202->182 211 5bed7c2-5bed7d3 211->172 213->211 214->211
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$
                                            • API String ID: 0-157503211
                                            • Opcode ID: 6160bbf100344cef3c8cc50489d26d341763b054c05e05b92df5d5156784a245
                                            • Instruction ID: 2bb882ca2596a87351bc46afc8c8375a90d1bf924333e16a4a63e55c7398b48d
                                            • Opcode Fuzzy Hash: 6160bbf100344cef3c8cc50489d26d341763b054c05e05b92df5d5156784a245
                                            • Instruction Fuzzy Hash: C281F274E04208DFDB04CFA9D944AAEBBF2FF49304F14816AD919AB345CBB4A946CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 215 5bed946-5bed94e 216 5bed968-5bed971 215->216 217 5bed950-5bed965 215->217 218 5bed977-5bed97d 216->218 219 5bed515-5bed51b 216->219 217->216 218->219 220 5bed51d 219->220 221 5bed524-5bed525 219->221 222 5bed75f-5bed7b9 220->222 223 5bed7fd-5bed81e 220->223 224 5bed60d-5bed60e 220->224 225 5bed6c8-5bed6d5 220->225 226 5bed5f6-5bed5f7 220->226 227 5bed563-5bed564 220->227 228 5bed533-5bed557 220->228 229 5bed5f0-5bed7ea 220->229 221->226 221->228 261 5bed7bc call 5bedb3a 222->261 262 5bed7bc call 5bedb92 222->262 223->219 232 5bed56c-5bed572 224->232 225->219 231 5bed585-5bed58b 226->231 227->232 228->219 233 5bed559-5bed561 228->233 239 5bed727-5bed75a 229->239 240 5bed7f0-5bed7f8 229->240 237 5bed58d 231->237 238 5bed594-5bed5ad 231->238 234 5bed57b-5bed583 232->234 235 5bed574 232->235 233->219 234->219 234->231 235->222 235->228 235->229 235->231 242 5bed6ac-5bed6bd 235->242 243 5bed8bb-5bed8f5 235->243 244 5bed839-5bed849 235->244 245 5bed897-5bed89e 235->245 246 5bed654-5bed68b 235->246 247 5bed712-5bed722 235->247 248 5bed823-5bed834 235->248 237->222 237->229 237->242 237->244 237->245 237->246 237->247 238->219 250 5bed5b3-5bed5bb 238->250 239->219 239->222 240->219 242->219 243->219 244->219 246->219 247->219 248->219 250->219 250->229 259 5bed7c2-5bed7d3 259->219 261->259 262->259
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$
                                            • API String ID: 0-157503211
                                            • Opcode ID: 2692c7b28e4f2d37ff168c4dc406e76cab06fe3e00b71e0e35b4757fce9c2838
                                            • Instruction ID: 0cea5036463651c4649c851ee62a25a68b29ef8eef7486d59b0ac7cd38b9b9fe
                                            • Opcode Fuzzy Hash: 2692c7b28e4f2d37ff168c4dc406e76cab06fe3e00b71e0e35b4757fce9c2838
                                            • Instruction Fuzzy Hash: A371F278A04208DFDB00CFA8D594AEEBBF2FF49304F148159E919AB345C7B4A946CF15

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 263 5bed5c0-5bed5dd 264 5bed515-5bed51b 263->264 265 5bed5e3-5bed5eb 263->265 267 5bed51d 264->267 268 5bed524-5bed525 264->268 265->264 266 5bed5f0-5bed7ea 265->266 279 5bed727-5bed75a 266->279 280 5bed7f0-5bed7f8 266->280 267->266 270 5bed75f-5bed7b9 267->270 271 5bed7fd-5bed81e 267->271 272 5bed60d-5bed60e 267->272 273 5bed6c8-5bed6d5 267->273 274 5bed5f6-5bed5f7 267->274 275 5bed563-5bed564 267->275 276 5bed533-5bed557 267->276 268->274 268->276 307 5bed7bc call 5bedb3a 270->307 308 5bed7bc call 5bedb92 270->308 271->264 278 5bed56c-5bed572 272->278 273->264 277 5bed585-5bed58b 274->277 275->278 276->264 281 5bed559-5bed561 276->281 285 5bed58d 277->285 286 5bed594-5bed5ad 277->286 282 5bed57b-5bed583 278->282 283 5bed574 278->283 279->264 279->270 280->264 281->264 282->264 282->277 283->266 283->270 283->276 283->277 288 5bed6ac-5bed6bd 283->288 289 5bed8bb-5bed8f5 283->289 290 5bed839-5bed849 283->290 291 5bed897-5bed89e 283->291 292 5bed654-5bed68b 283->292 293 5bed712-5bed722 283->293 294 5bed823-5bed834 283->294 285->266 285->270 285->288 285->290 285->291 285->292 285->293 286->264 297 5bed5b3-5bed5bb 286->297 288->264 289->264 290->264 292->264 293->264 294->264 297->264 297->266 305 5bed7c2-5bed7d3 305->264 307->305 308->305
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$
                                            • API String ID: 0-157503211
                                            • Opcode ID: c6b43384b85b95daa3d93a55de6b6c2c42c9d7389461e5bafcb15410ad6ceb2e
                                            • Instruction ID: e8743e5b6027ce190fa437730ee6c0fdb533639a593058417b03fa902db0bc28
                                            • Opcode Fuzzy Hash: c6b43384b85b95daa3d93a55de6b6c2c42c9d7389461e5bafcb15410ad6ceb2e
                                            • Instruction Fuzzy Hash: F371E078A44208DFDB00CFA8D584AEEBBF2FF49308F148159E919AB345C7B4A946CF54

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 309 5bed8b0-5bed8b1 310 5bed8ba 309->310 311 5bed8b3-5bed8b8 309->311 312 5bed8bb-5bed8f5 310->312 311->310 315 5bed515-5bed51b 312->315 316 5bed51d 315->316 317 5bed524-5bed525 315->317 318 5bed75f-5bed7b9 316->318 319 5bed7fd-5bed81e 316->319 320 5bed60d-5bed60e 316->320 321 5bed6c8-5bed6d5 316->321 322 5bed5f6-5bed5f7 316->322 323 5bed563-5bed564 316->323 324 5bed533-5bed557 316->324 325 5bed5f0-5bed7ea 316->325 317->322 317->324 354 5bed7bc call 5bedb3a 318->354 355 5bed7bc call 5bedb92 318->355 319->315 328 5bed56c-5bed572 320->328 321->315 327 5bed585-5bed58b 322->327 323->328 324->315 329 5bed559-5bed561 324->329 335 5bed727-5bed75a 325->335 336 5bed7f0-5bed7f8 325->336 333 5bed58d 327->333 334 5bed594-5bed5ad 327->334 330 5bed57b-5bed583 328->330 331 5bed574 328->331 329->315 330->315 330->327 331->312 331->318 331->324 331->325 331->327 338 5bed6ac-5bed6bd 331->338 339 5bed839-5bed849 331->339 340 5bed897-5bed89e 331->340 341 5bed654-5bed68b 331->341 342 5bed712-5bed722 331->342 343 5bed823-5bed834 331->343 333->318 333->325 333->338 333->339 333->340 333->341 333->342 334->315 345 5bed5b3-5bed5bb 334->345 335->315 335->318 336->315 338->315 339->315 341->315 342->315 343->315 345->315 345->325 352 5bed7c2-5bed7d3 352->315 354->352 355->352
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$
                                            • API String ID: 0-157503211
                                            • Opcode ID: 00662b6bd1230dc880449145f21cede0c686089f858a7e2f12eb2a557953d7f3
                                            • Instruction ID: 1dc6e318b6ac0d323f673f6bbf17a103e931a29742d424e9fd1c2cb0b719d1b6
                                            • Opcode Fuzzy Hash: 00662b6bd1230dc880449145f21cede0c686089f858a7e2f12eb2a557953d7f3
                                            • Instruction Fuzzy Hash: A9610578A44208DFCB00CFA8D594AEEBBF2FF49304F148159E919AB345C7B4A946CF55

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 356 5bed64d-5bed653 358 5bed654-5bed68b 356->358 362 5bed515-5bed51b 358->362 363 5bed51d 362->363 364 5bed524-5bed525 362->364 365 5bed75f-5bed7b9 363->365 366 5bed7fd-5bed81e 363->366 367 5bed60d-5bed60e 363->367 368 5bed6c8-5bed6d5 363->368 369 5bed5f6-5bed5f7 363->369 370 5bed563-5bed564 363->370 371 5bed533-5bed557 363->371 372 5bed5f0-5bed7ea 363->372 364->369 364->371 400 5bed7bc call 5bedb3a 365->400 401 5bed7bc call 5bedb92 365->401 366->362 375 5bed56c-5bed572 367->375 368->362 374 5bed585-5bed58b 369->374 370->375 371->362 376 5bed559-5bed561 371->376 382 5bed727-5bed75a 372->382 383 5bed7f0-5bed7f8 372->383 380 5bed58d 374->380 381 5bed594-5bed5ad 374->381 377 5bed57b-5bed583 375->377 378 5bed574 375->378 376->362 377->362 377->374 378->358 378->365 378->371 378->372 378->374 385 5bed6ac-5bed6bd 378->385 386 5bed8bb-5bed8f5 378->386 387 5bed839-5bed849 378->387 388 5bed897-5bed89e 378->388 389 5bed712-5bed722 378->389 390 5bed823-5bed834 378->390 380->358 380->365 380->372 380->385 380->387 380->388 380->389 381->362 392 5bed5b3-5bed5bb 381->392 382->362 382->365 383->362 385->362 386->362 387->362 389->362 390->362 392->362 392->372 399 5bed7c2-5bed7d3 399->362 400->399 401->399
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$
                                            • API String ID: 0-157503211
                                            • Opcode ID: 4036802e990b0513c38f48a56bb41cfd05758b819fc7b9a95efe4a3b653f2c5e
                                            • Instruction ID: 4f17e26e0fb23245097cbcc60a5530bc60f51e3f307c008c8ceb5ec04a60df7f
                                            • Opcode Fuzzy Hash: 4036802e990b0513c38f48a56bb41cfd05758b819fc7b9a95efe4a3b653f2c5e
                                            • Instruction Fuzzy Hash: EC61E278A44208DFCB00CFA8D594AEEBBF2FF49304F148159E919AB345CBB4A946CF55

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 448 5bed694-5bed698 449 5bed75f-5bed7b9 448->449 450 5bed6ac-5bed6bd 448->450 451 5bed712-5bed722 448->451 452 5bed5f0-5bed7ea 448->452 491 5bed7bc call 5bedb3a 449->491 492 5bed7bc call 5bedb92 449->492 453 5bed515-5bed51b 450->453 451->453 456 5bed727-5bed75a 452->456 457 5bed7f0-5bed7f8 452->457 458 5bed51d 453->458 459 5bed524-5bed525 453->459 456->449 456->453 457->453 458->449 458->452 460 5bed7fd-5bed81e 458->460 461 5bed60d-5bed60e 458->461 462 5bed6c8-5bed6d5 458->462 463 5bed5f6-5bed5f7 458->463 464 5bed563-5bed564 458->464 465 5bed533-5bed557 458->465 459->463 459->465 460->453 469 5bed56c-5bed572 461->469 462->453 468 5bed585-5bed58b 463->468 464->469 465->453 470 5bed559-5bed561 465->470 473 5bed58d 468->473 474 5bed594-5bed5ad 468->474 471 5bed57b-5bed583 469->471 472 5bed574 469->472 470->453 471->453 471->468 472->449 472->450 472->451 472->452 472->465 472->468 476 5bed8bb-5bed8f5 472->476 477 5bed839-5bed849 472->477 478 5bed897-5bed89e 472->478 479 5bed654-5bed68b 472->479 480 5bed823-5bed834 472->480 473->449 473->450 473->451 473->452 473->477 473->478 473->479 474->453 484 5bed5b3-5bed5bb 474->484 476->453 477->453 479->453 480->453 484->452 484->453 487 5bed7c2-5bed7d3 487->453 491->487 492->487
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$
                                            • API String ID: 0-157503211
                                            • Opcode ID: 35f2b03f1c29090414f8899516d4463115b8a0b881503daacd0c37c00b4f2a8b
                                            • Instruction ID: 289b94433b2919c359e6fc193c3106dfb57e17299784c11b669853df0b1f7a79
                                            • Opcode Fuzzy Hash: 35f2b03f1c29090414f8899516d4463115b8a0b881503daacd0c37c00b4f2a8b
                                            • Instruction Fuzzy Hash: 9261D078A44208DFDB00CFA8D594AEEBBF2FF49304F148159E919AB344C7B4A946CF55

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 402 5bed643-5bed644 403 5bed65d-5bed68b 402->403 404 5bed646-5bed648 402->404 408 5bed515-5bed51b 403->408 405 5bed654-5bed65a 404->405 405->403 409 5bed51d 408->409 410 5bed524-5bed525 408->410 411 5bed75f-5bed7b9 409->411 412 5bed7fd-5bed81e 409->412 413 5bed60d-5bed60e 409->413 414 5bed6c8-5bed6d5 409->414 415 5bed5f6-5bed5f7 409->415 416 5bed563-5bed564 409->416 417 5bed533-5bed557 409->417 418 5bed5f0-5bed7ea 409->418 410->415 410->417 446 5bed7bc call 5bedb3a 411->446 447 5bed7bc call 5bedb92 411->447 412->408 421 5bed56c-5bed572 413->421 414->408 420 5bed585-5bed58b 415->420 416->421 417->408 422 5bed559-5bed561 417->422 428 5bed727-5bed75a 418->428 429 5bed7f0-5bed7f8 418->429 426 5bed58d 420->426 427 5bed594-5bed5ad 420->427 423 5bed57b-5bed583 421->423 424 5bed574 421->424 422->408 423->408 423->420 424->405 424->411 424->417 424->418 424->420 431 5bed6ac-5bed6bd 424->431 432 5bed8bb-5bed8f5 424->432 433 5bed839-5bed849 424->433 434 5bed897-5bed89e 424->434 435 5bed712-5bed722 424->435 436 5bed823-5bed834 424->436 426->405 426->411 426->418 426->431 426->433 426->434 426->435 427->408 438 5bed5b3-5bed5bb 427->438 428->408 428->411 429->408 431->408 432->408 433->408 435->408 436->408 438->408 438->418 445 5bed7c2-5bed7d3 445->408 446->445 447->445
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$
                                            • API String ID: 0-157503211
                                            • Opcode ID: 9cbba66e49e64f63807c59e5f390f5127771a4080bfa14b7ae328732ed1f5948
                                            • Instruction ID: 89ef3b1080b3262e3b935fb24d599cadb8e845611f3063d9a046077d1d44b520
                                            • Opcode Fuzzy Hash: 9cbba66e49e64f63807c59e5f390f5127771a4080bfa14b7ae328732ed1f5948
                                            • Instruction Fuzzy Hash: 54610378A44208DFDB00CFA8D594AEEBBF2FF49304F148199E919AB344C7B4A946CF55

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 493 5bed52d-5bed52f 494 5bed533-5bed557 493->494 495 5bed559-5bed561 494->495 496 5bed515-5bed51b 494->496 495->496 497 5bed51d 496->497 498 5bed524-5bed525 496->498 497->494 499 5bed75f-5bed7b9 497->499 500 5bed7fd-5bed81e 497->500 501 5bed60d-5bed60e 497->501 502 5bed6c8-5bed6d5 497->502 503 5bed5f6-5bed5f7 497->503 504 5bed563-5bed564 497->504 505 5bed5f0-5bed7ea 497->505 498->494 498->503 536 5bed7bc call 5bedb3a 499->536 537 5bed7bc call 5bedb92 499->537 500->496 508 5bed56c-5bed572 501->508 502->496 507 5bed585-5bed58b 503->507 504->508 514 5bed727-5bed75a 505->514 515 5bed7f0-5bed7f8 505->515 512 5bed58d 507->512 513 5bed594-5bed5ad 507->513 509 5bed57b-5bed583 508->509 510 5bed574 508->510 509->496 509->507 510->494 510->499 510->505 510->507 517 5bed6ac-5bed6bd 510->517 518 5bed8bb-5bed8f5 510->518 519 5bed839-5bed849 510->519 520 5bed897-5bed89e 510->520 521 5bed654-5bed68b 510->521 522 5bed712-5bed722 510->522 523 5bed823-5bed834 510->523 512->499 512->505 512->517 512->519 512->520 512->521 512->522 513->496 525 5bed5b3-5bed5bb 513->525 514->496 514->499 515->496 517->496 518->496 519->496 521->496 522->496 523->496 525->496 525->505 534 5bed7c2-5bed7d3 534->496 536->534 537->534
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$
                                            • API String ID: 0-157503211
                                            • Opcode ID: cece20fab2b39a2e7988afc43aa6abbd222ad3864442724477ad5c1a32826a4b
                                            • Instruction ID: 3c3e198b3cb41e6980d9bf436c97ac402f1ca6017c8b8e9edc7a543ea84701f3
                                            • Opcode Fuzzy Hash: cece20fab2b39a2e7988afc43aa6abbd222ad3864442724477ad5c1a32826a4b
                                            • Instruction Fuzzy Hash: 2E610278A44208DFCB00CFA8D594AEEBBF2FF49304F148159E919AB344C7B4A946CF55

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 538 5bed568-5bed56a 539 5bed56c-5bed572 538->539 540 5bed57b-5bed583 539->540 541 5bed574 539->541 548 5bed585-5bed58b 540->548 553 5bed515-5bed51b 540->553 542 5bed75f-5bed7b9 541->542 543 5bed6ac-5bed6bd 541->543 544 5bed8bb-5bed8f5 541->544 545 5bed839-5bed849 541->545 546 5bed897-5bed89e 541->546 547 5bed654-5bed68b 541->547 541->548 549 5bed712-5bed722 541->549 550 5bed823-5bed834 541->550 551 5bed533-5bed557 541->551 552 5bed5f0-5bed7ea 541->552 581 5bed7bc call 5bedb3a 542->581 582 5bed7bc call 5bedb92 542->582 543->553 544->553 545->553 547->553 554 5bed58d 548->554 555 5bed594-5bed5ad 548->555 549->553 550->553 551->553 560 5bed559-5bed561 551->560 563 5bed727-5bed75a 552->563 564 5bed7f0-5bed7f8 552->564 558 5bed51d 553->558 559 5bed524-5bed525 553->559 554->542 554->543 554->545 554->546 554->547 554->549 554->552 555->553 570 5bed5b3-5bed5bb 555->570 558->542 558->551 558->552 565 5bed7fd-5bed81e 558->565 566 5bed60d-5bed60e 558->566 567 5bed6c8-5bed6d5 558->567 568 5bed5f6-5bed5f7 558->568 569 5bed563-5bed564 558->569 559->551 559->568 560->553 563->542 563->553 564->553 565->553 566->539 567->553 568->548 569->539 570->552 570->553 580 5bed7c2-5bed7d3 580->553 581->580 582->580
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$
                                            • API String ID: 0-157503211
                                            • Opcode ID: ec90318d36a1542b71c16bbaf6eb2447f34845b37f5fa013640a90b85d38d8be
                                            • Instruction ID: ee62b9d0e7652539cfd12789f64a3dd1289e55cf3600e58f763c613f632445fa
                                            • Opcode Fuzzy Hash: ec90318d36a1542b71c16bbaf6eb2447f34845b37f5fa013640a90b85d38d8be
                                            • Instruction Fuzzy Hash: F161F078A44208DFCB00CFA8D594AEEBBF2FF49304F148159E919AB344C7B4A946CF55

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 583 5bed7d9 584 5bed7fd-5bed81e 583->584 585 5bed7e1-5bed7ea 583->585 588 5bed515-5bed51b 584->588 586 5bed727-5bed75a 585->586 587 5bed7f0-5bed7f8 585->587 586->588 594 5bed75f-5bed7b9 586->594 587->588 591 5bed51d 588->591 592 5bed524-5bed525 588->592 591->584 591->594 595 5bed60d-5bed60e 591->595 596 5bed6c8-5bed6d5 591->596 597 5bed5f6-5bed5f7 591->597 598 5bed563-5bed564 591->598 599 5bed533-5bed557 591->599 600 5bed5f0-5bed5f1 591->600 592->597 592->599 626 5bed7bc call 5bedb3a 594->626 627 5bed7bc call 5bedb92 594->627 603 5bed56c-5bed572 595->603 596->588 602 5bed585-5bed58b 597->602 598->603 599->588 604 5bed559-5bed561 599->604 600->585 608 5bed58d 602->608 609 5bed594-5bed5ad 602->609 605 5bed57b-5bed583 603->605 606 5bed574 603->606 604->588 605->588 605->602 606->594 606->599 606->600 606->602 610 5bed6ac-5bed6bd 606->610 611 5bed8bb-5bed8f5 606->611 612 5bed839-5bed849 606->612 613 5bed897-5bed89e 606->613 614 5bed654-5bed68b 606->614 615 5bed712-5bed722 606->615 616 5bed823-5bed834 606->616 608->594 608->600 608->610 608->612 608->613 608->614 608->615 609->588 617 5bed5b3-5bed5bb 609->617 610->588 611->588 612->588 614->588 615->588 616->588 617->588 617->600 624 5bed7c2-5bed7d3 624->588 626->624 627->624
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "$$
                                            • API String ID: 0-157503211
                                            • Opcode ID: e8e913d171781eba8840a1b0ee1b76b1ac0da8dfb4b5c10cf895628df42f6821
                                            • Instruction ID: 4353642e6dfdf2f77b112aec5c32731eeaa253d10c75b7fcb9e24a9772db198a
                                            • Opcode Fuzzy Hash: e8e913d171781eba8840a1b0ee1b76b1ac0da8dfb4b5c10cf895628df42f6821
                                            • Instruction Fuzzy Hash: 3761E078A44208DFDB00CFA8D594AEEBBF2FF49304F148159E919AB344C7B4A946CF65
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,$3
                                            • API String ID: 0-2150557222
                                            • Opcode ID: c7d57ec95df47c461ae1d1953ad625fa2708c4c3a199788350561d105500a19e
                                            • Instruction ID: b88c7e0de21dd1d96b50c8dd365f1111b60fca1b263ebf5a2f9e386eb96d027f
                                            • Opcode Fuzzy Hash: c7d57ec95df47c461ae1d1953ad625fa2708c4c3a199788350561d105500a19e
                                            • Instruction Fuzzy Hash: C2410374E04218CBDB10CFA9D845BDEBBF2FB48364F2091A6D559A7288C7348E85CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Q$a
                                            • API String ID: 0-1499606525
                                            • Opcode ID: d39dfbbed057ea0225fde46729c40dbaa33c4fa33b21a8ed83eff18e169726dd
                                            • Instruction ID: 516d87160dd473356e765b7c047f29c94ef528a92f29055326eeb4dd29e378da
                                            • Opcode Fuzzy Hash: d39dfbbed057ea0225fde46729c40dbaa33c4fa33b21a8ed83eff18e169726dd
                                            • Instruction Fuzzy Hash: 8A41CD74A40228CFDBA4DF28E994ADABBF5FB49345F1081E9D419A7344DA70AEC4CF40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $,
                                            • API String ID: 0-71045815
                                            • Opcode ID: ab3f4b21c850f74674359e243f74fb2443240ceff5e67dead663cfe87dc3f1dc
                                            • Instruction ID: baff9684a24b4efbc5c85638f827fda35af982b6ab28ba5d72818d7bdcc39baa
                                            • Opcode Fuzzy Hash: ab3f4b21c850f74674359e243f74fb2443240ceff5e67dead663cfe87dc3f1dc
                                            • Instruction Fuzzy Hash: D42115B0D05228CBEB10CFA9D945BEEB7F2FB48354F20A1A9D449A7288D7345E85CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: *$,
                                            • API String ID: 0-162240353
                                            • Opcode ID: f9b2ed781dae8ad5639d656bb5ff1b4c3fb77d975bb3064a8b4b97f57df521e8
                                            • Instruction ID: 9ec374ec7cc3551c6465b57f0a654e97684022000b3c1cc942aff013fbf5cebd
                                            • Opcode Fuzzy Hash: f9b2ed781dae8ad5639d656bb5ff1b4c3fb77d975bb3064a8b4b97f57df521e8
                                            • Instruction Fuzzy Hash: F92105B0D05228CFEB10CF98D949BEEB7F2FB08359F2061A9D449A7288D7754E84CB14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: *$,
                                            • API String ID: 0-162240353
                                            • Opcode ID: 4602bbe4949e23aa0ff3ec52f548e48c255ee570dde1ca71077b21b5e6cac2a1
                                            • Instruction ID: dfa45e08006384a56732351e8cdad8d4c2b317d2a21c79f6fe6737eb294c5a8e
                                            • Opcode Fuzzy Hash: 4602bbe4949e23aa0ff3ec52f548e48c255ee570dde1ca71077b21b5e6cac2a1
                                            • Instruction Fuzzy Hash: 0921F3B0D05218CFEB10CF98D945BEEBBF2FB48359F2050A5D409AB288D3754E84CB14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $$,
                                            • API String ID: 0-53852779
                                            • Opcode ID: 990a29fd0ae4a1f704ba85f4b3197ca318e3689f27fc2edaabf619fdddddb7c3
                                            • Instruction ID: 14a5b6da37a9e01527bb3f566a884b4e7dc40df8c7f20cf83d34548368945fce
                                            • Opcode Fuzzy Hash: 990a29fd0ae4a1f704ba85f4b3197ca318e3689f27fc2edaabf619fdddddb7c3
                                            • Instruction Fuzzy Hash: 4621F3B0D05218CBDB10CFA9D944BEEB7F2FB08369F2051A9D449A7288D3758E45CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: %$,
                                            • API String ID: 0-49795164
                                            • Opcode ID: 8409a964bd6aa47461327dc1bb54a4f1b1ef3b9b7331b7a6b55cfb3ef6c37cda
                                            • Instruction ID: 53add2525214a4b5b244d14f6548ae1c80de497371b2550761f46e57727239a8
                                            • Opcode Fuzzy Hash: 8409a964bd6aa47461327dc1bb54a4f1b1ef3b9b7331b7a6b55cfb3ef6c37cda
                                            • Instruction Fuzzy Hash: 571116B0D05218CBEB10CFA9D945BEEB7F2FB48355F2090A6D449A7288D7354E45CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,$5
                                            • API String ID: 0-1766671123
                                            • Opcode ID: 35f6332f267399f15ce8d673333b29af3ea3839a9e6f976d76d0b57297d02937
                                            • Instruction ID: 58a5702f2d82bf2d474b805ad1ad87ca46c3ff1ef90e2cbbd35b86ebf4ce872c
                                            • Opcode Fuzzy Hash: 35f6332f267399f15ce8d673333b29af3ea3839a9e6f976d76d0b57297d02937
                                            • Instruction Fuzzy Hash: F81132B0D05228CBEB10CF98D944BEEB7F2FB48365F2090A6D40AA7288C3344E84CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 0$B
                                            • API String ID: 0-2987457944
                                            • Opcode ID: 1c62a5e897d9a1720eee86ba6406b82619710964c343b3f9215d26d90bd5a80b
                                            • Instruction ID: 45fe1bf4cd554c83b568f79a65b73df5bb0cebe043e4c61a3f61203fd8028fcd
                                            • Opcode Fuzzy Hash: 1c62a5e897d9a1720eee86ba6406b82619710964c343b3f9215d26d90bd5a80b
                                            • Instruction Fuzzy Hash: FE110575A05228DFDB50CF58D880BDEBBB6BB4A214F24A194D84DAB389C7749D80CF15
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $#
                                            • API String ID: 0-2491617062
                                            • Opcode ID: 482a562628c2bb713b8fa2ba68f122af8b2950c76adce701748a6e480b3d073a
                                            • Instruction ID: 85e757c3f1166b9d7aeffce72d965a2c29e8df2a2c9ecc4b09cfed87ed1d1577
                                            • Opcode Fuzzy Hash: 482a562628c2bb713b8fa2ba68f122af8b2950c76adce701748a6e480b3d073a
                                            • Instruction Fuzzy Hash: BAE046749093588BEFA4CF60D41C7AABAB1EB01305F10249A810A232C1CB784AC4CE01
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05EAB25F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 528f8f4d36cd3ed77304de535c642de23acada1109c4e43a7affc3df08b63fa0
                                            • Instruction ID: 38223858acc87cd9e7d33c7589fd978887d99b6103d98193bc02bdfb6d2d6410
                                            • Opcode Fuzzy Hash: 528f8f4d36cd3ed77304de535c642de23acada1109c4e43a7affc3df08b63fa0
                                            • Instruction Fuzzy Hash: 6CA102B1D04219CFEF10CFA9C8857EDBBB1BF49304F14A169E899AB280DB749985CF45
                                            APIs
                                            • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 05EAB25F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: CreateProcess
                                            • String ID:
                                            • API String ID: 963392458-0
                                            • Opcode ID: 8ff49dcea454e64443d34881b1cd70e20557280e83e4bf876d16330ac333a6e7
                                            • Instruction ID: 630c10ba327ca7246aa26c4126b0a81dd161a703290f804c7ffdef8c174cefe9
                                            • Opcode Fuzzy Hash: 8ff49dcea454e64443d34881b1cd70e20557280e83e4bf876d16330ac333a6e7
                                            • Instruction Fuzzy Hash: 9FA10371D04219CFEF10CFA9C8857EEBBB5BF49304F10A169E899AB280DB749985CF45
                                            APIs
                                            • CopyFileA.KERNEL32(?,?,?), ref: 05EA01BB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: CopyFile
                                            • String ID:
                                            • API String ID: 1304948518-0
                                            • Opcode ID: 53585add628d56e0c55e4d4ef6f49432755a33ac9e79270ace58a2d899e1aca1
                                            • Instruction ID: 6ab3e3fb549395957208903c63508fb4ddd3d802b10ac8075bf51f3e1cbab7f0
                                            • Opcode Fuzzy Hash: 53585add628d56e0c55e4d4ef6f49432755a33ac9e79270ace58a2d899e1aca1
                                            • Instruction Fuzzy Hash: 93613771D043199FEB10CFB9C8897EDBBB1BF49314F14A129E855AB280E774A985CF41
                                            APIs
                                            • CopyFileA.KERNEL32(?,?,?), ref: 05EA01BB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: CopyFile
                                            • String ID:
                                            • API String ID: 1304948518-0
                                            • Opcode ID: 3e520c95ed54a30ed1444f8dd5bf9b0202eb6852510258c5aa5db33f2326e9eb
                                            • Instruction ID: 76808b89b51c0201023036dc39287d07938b89fcacecbba149e08a3134bd306c
                                            • Opcode Fuzzy Hash: 3e520c95ed54a30ed1444f8dd5bf9b0202eb6852510258c5aa5db33f2326e9eb
                                            • Instruction Fuzzy Hash: 29612671D003189FEB10CFA9C9897EEBBF1BF49314F10A129E855AB240E774A985CF45
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05EAC28B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 561f7462a2c83f973bb948963ce951f1c6471d835e4f9340536e7d89df7620d9
                                            • Instruction ID: 2634956a7bf2cbbf16377d16eb7766e8c832c68aa8a3affa7da9ec0c6a3a8b15
                                            • Opcode Fuzzy Hash: 561f7462a2c83f973bb948963ce951f1c6471d835e4f9340536e7d89df7620d9
                                            • Instruction Fuzzy Hash: 6041ABB5D012589FDF00CFA9D985ADEFBF1BB49310F24A02AE419BB200D775A945CF64
                                            APIs
                                            • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 05EAC28B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: MemoryProcessWrite
                                            • String ID:
                                            • API String ID: 3559483778-0
                                            • Opcode ID: 0acdeed7c42756965b3ac2af8285a04d08b2d136ba390df073f33eedee05f5a5
                                            • Instruction ID: e7712a700692b6dd2a0ef10926aea80582dd06f533865d8bb58d2b9babbc3bcd
                                            • Opcode Fuzzy Hash: 0acdeed7c42756965b3ac2af8285a04d08b2d136ba390df073f33eedee05f5a5
                                            • Instruction Fuzzy Hash: 2D41ABB5D012589FDF00CFA9D980ADEFBF1BB49310F20A02AE419BB200D774A945CF64
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: 27ef17143649b752e703767e46cb12a752c0ad438936749a553edfaeaab61431
                                            • Instruction ID: 1e339f5bc21098c74ee95fce4f3c1fd0e4002f5c9d243ed0c968733780aa2be4
                                            • Opcode Fuzzy Hash: 27ef17143649b752e703767e46cb12a752c0ad438936749a553edfaeaab61431
                                            • Instruction Fuzzy Hash: E1D15774A05208CFDB88CBA8D494BADBBF2FF89310F1544A9E406DB3A5CA74EC45CB41
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05EAD41A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: dde3fad293a313ad928b250920c380ceeffaa894431a6b78c840c4ecf6b26fc2
                                            • Instruction ID: 98e4dbd1a29ac23b1015637f1c20bac42c43753b3c8249a2b6d2ca88fdade854
                                            • Opcode Fuzzy Hash: dde3fad293a313ad928b250920c380ceeffaa894431a6b78c840c4ecf6b26fc2
                                            • Instruction Fuzzy Hash: 283197B9D042589FCF10CFA9D980A9EFBB1BB49310F10A02AE815BB200D775A901CF68
                                            APIs
                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05EAD41A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 1941b19239a89f9b5c3e8b9a35717b544eba51f5468b35795f635c25c467bb4f
                                            • Instruction ID: b080405ad7bc5afcca0d3ce8cd2ff7b731ba955dc33eaa06e7a35189e03537d5
                                            • Opcode Fuzzy Hash: 1941b19239a89f9b5c3e8b9a35717b544eba51f5468b35795f635c25c467bb4f
                                            • Instruction Fuzzy Hash: 6831A8B9D04248DFCF10CFA9D980ADEFBB1BB49310F10A02AE815BB200D735A906CF58
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 05EACDCF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: 3c353c3e4d4c83e6ceba1b1342774b429941410e1a46d572d197684b1090ec52
                                            • Instruction ID: d98a93928a62206eeb9127c62a95570c16418c82a85a0d2a3cf3408d6a32660b
                                            • Opcode Fuzzy Hash: 3c353c3e4d4c83e6ceba1b1342774b429941410e1a46d572d197684b1090ec52
                                            • Instruction Fuzzy Hash: 0441CAB5D01258DFDB10CFAAD885AEEBBF1BF48314F24902AE418BB240D778A945CF54
                                            APIs
                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05CCD734
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144840675.0000000005CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cc0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: ed05e861117fe4856ac6668ccec214cdd05c92ada978dc141bbb1c5c7f1326d6
                                            • Instruction ID: 7d515526393802290bef4837a989c16dbbb6738423dbf8e01b23523b4c227634
                                            • Opcode Fuzzy Hash: ed05e861117fe4856ac6668ccec214cdd05c92ada978dc141bbb1c5c7f1326d6
                                            • Instruction Fuzzy Hash: 9731A7B8D01248DFCF10CFA9D980A9EFBB1BF49320F20942AE815B7210D775A945CF94
                                            APIs
                                            • Wow64SetThreadContext.KERNEL32(?,?), ref: 05EACDCF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: ContextThreadWow64
                                            • String ID:
                                            • API String ID: 983334009-0
                                            • Opcode ID: ff27e1e846cc1a2ffb4687fe1c31d934ffc5f3975ae9fff4ef5d172a25555eb9
                                            • Instruction ID: eaa560ea98452e86a324d6b4283ec67c4cc0474e970055a61be485b2d56ecdee
                                            • Opcode Fuzzy Hash: ff27e1e846cc1a2ffb4687fe1c31d934ffc5f3975ae9fff4ef5d172a25555eb9
                                            • Instruction Fuzzy Hash: 8D31BAB5D012589FDB10CFAAD885AEEBBF1BF48314F24902AE419BB240D778A945CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: d
                                            • API String ID: 0-2564639436
                                            • Opcode ID: f00240b2296ba786164efb909fd84a9140733631b2aaf1339f08a476b108a1e8
                                            • Instruction ID: f9527607b6cab3f081c5ccea604ff49c913a333f9d144c6a7c11a876f24f3297
                                            • Opcode Fuzzy Hash: f00240b2296ba786164efb909fd84a9140733631b2aaf1339f08a476b108a1e8
                                            • Instruction Fuzzy Hash: A2D1AA30200642DFDB15DF68C4809AEBBF2FF88710B158E69E45A9B361DB74F946CB90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID: 0-3916222277
                                            • Opcode ID: 574ef844e2981e3bed6655ecf6d0ed3124b0872923513eadfed7d797848cabed
                                            • Instruction ID: ce443fb7ec04f3829f3deacc8ca93d1f4bfa37419b0929f00fcc61b4d8b3ac04
                                            • Opcode Fuzzy Hash: 574ef844e2981e3bed6655ecf6d0ed3124b0872923513eadfed7d797848cabed
                                            • Instruction Fuzzy Hash: 5AC12670D08229CFEB00CF99D545BFEBBFABB89304F10A129D459A7249D7B84985CF84
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: 250238f9ed6bf5b0e6d6f09415af46b520e0018e339cc29f63a6fbe73c5ef999
                                            • Instruction ID: b586e299a18fcd752868e221b40e554dd79c71c83e85f150d7dc2f7105dfbe61
                                            • Opcode Fuzzy Hash: 250238f9ed6bf5b0e6d6f09415af46b520e0018e339cc29f63a6fbe73c5ef999
                                            • Instruction Fuzzy Hash: E0B1B074A09228DFDBA0DF68D894B9ABBB2FB49304F1081DAD54DA7344DB749E84CF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: j?M
                                            • API String ID: 0-1051482257
                                            • Opcode ID: 0f61a74af3bc72c6beb32f29c1c2df98b31f8266513dc95dcbacff21de2b49ad
                                            • Instruction ID: 2f57e3e1c455d613a150ac42cce12d091956a9f81c21da29ecb974f5367a6c53
                                            • Opcode Fuzzy Hash: 0f61a74af3bc72c6beb32f29c1c2df98b31f8266513dc95dcbacff21de2b49ad
                                            • Instruction Fuzzy Hash: 8B915C70E48288DFDB55CFA8D444AADBBB6FF49300F248099E415AB355CB34AE41CF51
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: 76f5de4f86a5856cb1460993a17c05075d87699f5eb131f77701dd9100ddac2d
                                            • Instruction ID: e1cbf58cc7ad9015687d18c1f79e3be5c84dc8158804f32714f638a9d0cf1e7b
                                            • Opcode Fuzzy Hash: 76f5de4f86a5856cb1460993a17c05075d87699f5eb131f77701dd9100ddac2d
                                            • Instruction Fuzzy Hash: D7A1AD74A05228DFDBA0DF69D894B9ABBB2FB49304F1080DAD54DA7344DB749E84CF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: 056ddcfe36d7a9ad04e6e87117e46df409c6fb614963b0f59e3fa79f2be8170a
                                            • Instruction ID: acb8ea9ef2b40bfa6f3a72a8ba135b6f2858d9c049ae8399ed318bf306928334
                                            • Opcode Fuzzy Hash: 056ddcfe36d7a9ad04e6e87117e46df409c6fb614963b0f59e3fa79f2be8170a
                                            • Instruction Fuzzy Hash: FF91AD74A09228DFDBA0DF69D884B9ABBB2FB49304F1080DAD54DA7344DB749E85CF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: @
                                            • API String ID: 0-2766056989
                                            • Opcode ID: 063d51124a351c3e70e64ce029f336225f8507e28ef993913c45b8f4d7c897a9
                                            • Instruction ID: ddad64e4f8afecc15165af70444f9f2dae73f7cafa11982f983000dbb31da8e2
                                            • Opcode Fuzzy Hash: 063d51124a351c3e70e64ce029f336225f8507e28ef993913c45b8f4d7c897a9
                                            • Instruction Fuzzy Hash: A891BD74A09228DFDBA0DF68D884B9ABBB2FB49304F1080DAD54DA7344DB749E85CF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: kOl^
                                            • API String ID: 0-4017777103
                                            • Opcode ID: 883978412c13ff815a2de5afc26324266e251a1a075068a4fc5591a37e1316a6
                                            • Instruction ID: 15b03fac604476d768084376718f3b83fcb58972573fa861779f5f1535db6ae4
                                            • Opcode Fuzzy Hash: 883978412c13ff815a2de5afc26324266e251a1a075068a4fc5591a37e1316a6
                                            • Instruction Fuzzy Hash: CF517974E41209DFDB44CFAAE8846AEBBF2FB88300F00D069D405A7250DB789E85CF90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: "
                                            • API String ID: 0-123907689
                                            • Opcode ID: 7dce914813bd0482508af57f15dc58195960766a5e8baa8c99a1bbca82afb289
                                            • Instruction ID: 66c89bf59a7625cc89bd07793235b9ee49af52a5d57662af9a365762e9c94124
                                            • Opcode Fuzzy Hash: 7dce914813bd0482508af57f15dc58195960766a5e8baa8c99a1bbca82afb289
                                            • Instruction Fuzzy Hash: 6051AC7591421DDFDB10CFA8D884BADBBF2FB09318F08919AE848AB245C774A984CF55
                                            APIs
                                            • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 05CCE867
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144840675.0000000005CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cc0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 8196923e922eb99c7d0473cd2c4fd45dcecd5251ca516367ef778e17232cd88e
                                            • Instruction ID: a418cade36415a795bb087c80c600a3d8f24accf5d443775310746305302ca2d
                                            • Opcode Fuzzy Hash: 8196923e922eb99c7d0473cd2c4fd45dcecd5251ca516367ef778e17232cd88e
                                            • Instruction Fuzzy Hash: AA31B8B8D00248DFDF10CFA9D880A9EFBB5BF49310F10A42AE814B7210D775A941CF94
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: !
                                            • API String ID: 0-2657877971
                                            • Opcode ID: d8e80817cbedce0beebd0bfec3a609a180602d22e879f58ca67e8cb1de6feaf4
                                            • Instruction ID: 099f810e05eab19df6ef7c42b1ac8033aceabe89b83bc2dc8b5fcae630c63721
                                            • Opcode Fuzzy Hash: d8e80817cbedce0beebd0bfec3a609a180602d22e879f58ca67e8cb1de6feaf4
                                            • Instruction Fuzzy Hash: FB31C974A402298FDB95DF69D954B9ABBB6EB88300F1081E9D51993384CB349FC1CF94
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: *
                                            • API String ID: 0-163128923
                                            • Opcode ID: 61fca1cb990da1a2e0527b379681f190368a0282352c0495e9ad692e8a9813a4
                                            • Instruction ID: a5433950de2bedf916116ea8dec682714c2aa63efead7a378055b0f41e45cf80
                                            • Opcode Fuzzy Hash: 61fca1cb990da1a2e0527b379681f190368a0282352c0495e9ad692e8a9813a4
                                            • Instruction Fuzzy Hash: 58213DB5D042189BDB18CFAAC9042AEFBF6BFC8300F14C16AD818A7354EB745502CF41
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 1
                                            • API String ID: 0-2212294583
                                            • Opcode ID: 9c8784a69ccb7b2adc3352b02b37c43d4758eddb729437f3d91b3c471e626353
                                            • Instruction ID: a2aa910281c6fa252bb95a2bf96b735bdc738fd57876e41de4bce14ee6c78ce3
                                            • Opcode Fuzzy Hash: 9c8784a69ccb7b2adc3352b02b37c43d4758eddb729437f3d91b3c471e626353
                                            • Instruction Fuzzy Hash: 072128789022298FEB50DF66DD58B9EBAB6BB88310F1091D6D109A7754DF388E818F40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: d8d9edc47da44d61f26b30cc02726398c703ce40a509ddf476244c39e5811e3e
                                            • Instruction ID: 2f149f32ad04246270a5f90a01db41d86b56d26cf148e8d5f39cb7e2a788f9c4
                                            • Opcode Fuzzy Hash: d8d9edc47da44d61f26b30cc02726398c703ce40a509ddf476244c39e5811e3e
                                            • Instruction Fuzzy Hash: 9531F374A05228CFDB50CF59D945BDEBBF2FB48354F1090A9D509A7288C7349E84CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: r
                                            • API String ID: 0-1812594589
                                            • Opcode ID: 3542b79132fc8c98832a5d9bf50527a692a99af6a44832e65e59d5ecf576dba4
                                            • Instruction ID: d0ef429547df6b91173180a98a72379340b23f0cb743b5e775a9c388a0de2d4c
                                            • Opcode Fuzzy Hash: 3542b79132fc8c98832a5d9bf50527a692a99af6a44832e65e59d5ecf576dba4
                                            • Instruction Fuzzy Hash: 1731D274A54328CFDBA4DF68E99469ABBB1FB49745F0040EAD41AA7240DA74AFC4CF40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 9eefc0e24547fbe4a6623038734efd759281ee5dbdcc9a820ae9c182f1438722
                                            • Instruction ID: 560688cae1dd52ea8025599e6d53f2d4f0192e9a6c58076cc4bc0b618764add2
                                            • Opcode Fuzzy Hash: 9eefc0e24547fbe4a6623038734efd759281ee5dbdcc9a820ae9c182f1438722
                                            • Instruction Fuzzy Hash: 4E211374904218CFDB10CFA9E949BDEBBF2FB48369F1091A6D449A7248D7348E84CF10
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 445b72cde1589de41cf69c022107a43588d6596c5ebaf66fe841ed2c8faac8b9
                                            • Instruction ID: abba00bf6bac332c7f68792af97c7891885b07d143ad6ca016335f61bf1bee67
                                            • Opcode Fuzzy Hash: 445b72cde1589de41cf69c022107a43588d6596c5ebaf66fe841ed2c8faac8b9
                                            • Instruction Fuzzy Hash: 5D213674D05218CFEB00CFA9D944BEABBF2FB08359F2491A6D44AA7288D7358E44CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: b98f7ffb8e38b7ab788a69b88510b28513e83d3b5b8becdd81ceff175d3100ae
                                            • Instruction ID: a6532ab03c3256fade619f41bf777c4907fad60d8eafbe678307931c3bd01f6d
                                            • Opcode Fuzzy Hash: b98f7ffb8e38b7ab788a69b88510b28513e83d3b5b8becdd81ceff175d3100ae
                                            • Instruction Fuzzy Hash: 2621E470D05218CBEB10CF99D945BEEB7F2FB48355F2090A5D44AA7288D7754E85CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 7080ee0b572778909469672564701d8274fea7308cc153b525f5084b6bfd5f3a
                                            • Instruction ID: 3b20d6de3f243172cd62e2671a8290595c97670ffb997130d923732adec3e071
                                            • Opcode Fuzzy Hash: 7080ee0b572778909469672564701d8274fea7308cc153b525f5084b6bfd5f3a
                                            • Instruction Fuzzy Hash: 8421F3B0D05228CBEB10CF99D944BEEB7F2FB48365F2091A5D449A7288D7344E80CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 4a035188660cf1d436c9ed73d1f89f62cc91995e0d8544c24297521c1f64d4d2
                                            • Instruction ID: 25a6e7bb18934c3eded0f19f358e68bb6f1e5fc80db8daa548180d8fb50523d5
                                            • Opcode Fuzzy Hash: 4a035188660cf1d436c9ed73d1f89f62cc91995e0d8544c24297521c1f64d4d2
                                            • Instruction Fuzzy Hash: 9021F3B0D05218CBEB10CFA9D945BEEBBF2FB48359F2090A5D449A7288D7758E85CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: e509396b43ead7a3d5a81fff4d91892cc2f0a3b568782580da027d2fb4bfb0fe
                                            • Instruction ID: 48edc5a9f3fb53660415bbda5701580b1cab6132ef01f20856d2fb42598f87fc
                                            • Opcode Fuzzy Hash: e509396b43ead7a3d5a81fff4d91892cc2f0a3b568782580da027d2fb4bfb0fe
                                            • Instruction Fuzzy Hash: 0F21F0B0D05228CBEB10CF99D945BEEB7F2FB48359F2090AAD409A7288D7755E85CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 4cd44425ff1f00e07e0459dab643aba5af037ec45ac5d08d379b139ea11a96e3
                                            • Instruction ID: 359cdc337aad112b67a76e38ad0565af45e3ee87e9b87900f093db4ff7762995
                                            • Opcode Fuzzy Hash: 4cd44425ff1f00e07e0459dab643aba5af037ec45ac5d08d379b139ea11a96e3
                                            • Instruction Fuzzy Hash: ED2104B0D05218CBDB10CF98D945BEEB7F2FB48365F2051A5D449A7288D7754E84CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: e690a365542ad5149a12cbc9d0583f721bb3af07ce22f075b6efa5933c48d0ae
                                            • Instruction ID: 5ce82bcfa4fd6a65abeb4c0e3c68363dbca131d4ae52dbe0ab732b332eb98cfb
                                            • Opcode Fuzzy Hash: e690a365542ad5149a12cbc9d0583f721bb3af07ce22f075b6efa5933c48d0ae
                                            • Instruction Fuzzy Hash: 0D216A70D05218CBEB10CF98D944BEEB7F2FB48369F2090A5C44AA7288D7354E85CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 54fc2f9900638c213020eb8c74782a75c181baeb29a4c20be11215ff81696075
                                            • Instruction ID: 29e5df2bc3ff687744861feacaeaed488c6d10cecd4f79f4fd4c9dc19438880d
                                            • Opcode Fuzzy Hash: 54fc2f9900638c213020eb8c74782a75c181baeb29a4c20be11215ff81696075
                                            • Instruction Fuzzy Hash: 911146B0D05228CBDB10CF98D945BEEB7F2FB48365F2051A6D449A7288C3344E81CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 217132a1e80e0091d9ff40a63d59acdd4ce188a4c491ad0603a9ff1c4ffac006
                                            • Instruction ID: 240a23ea3d3ab94cb10a07943719a1846ead3f20db11491ffe60f26c962c85bd
                                            • Opcode Fuzzy Hash: 217132a1e80e0091d9ff40a63d59acdd4ce188a4c491ad0603a9ff1c4ffac006
                                            • Instruction Fuzzy Hash: 391146B0D05228CBDB10CF98D945BEEB7F2FB48365F2051A6D449A7288C3344E80CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: bc84b783403f68c073572ad7d6cc8098c9aacdaeefc7893208ca168ee932bc96
                                            • Instruction ID: ceab85d552a26119055934f85a85929ec156c54be46e76630cf70d3c9c0facf5
                                            • Opcode Fuzzy Hash: bc84b783403f68c073572ad7d6cc8098c9aacdaeefc7893208ca168ee932bc96
                                            • Instruction Fuzzy Hash: A4113774D05228CBDB10CF99D944BEEB7F2FB48355F2050A6D44AA7288D7354E40CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: f072d3b7cd3468e5730a906ed96eb990469a35e7ab8801420ca354c09be064be
                                            • Instruction ID: adb100f24e6c8adf16fd4a2216eaf31cf73c3a3a26f4609dfb292edeedb42acf
                                            • Opcode Fuzzy Hash: f072d3b7cd3468e5730a906ed96eb990469a35e7ab8801420ca354c09be064be
                                            • Instruction Fuzzy Hash: DD111674D05228CBDB10CF99D945BEEB7F2FB48355F2091A6D54AA7288D7344E41CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 3970df65d09cd819624ac9d9d32fae4cd6236f84b976c1f498251dd721517174
                                            • Instruction ID: ce0844af6a191e835e781da876c03b90aaec8001da1408bd6f40064da6d9c9db
                                            • Opcode Fuzzy Hash: 3970df65d09cd819624ac9d9d32fae4cd6236f84b976c1f498251dd721517174
                                            • Instruction Fuzzy Hash: A1113670D05228CBDB10CF99D944BEEB7F2FB48355F1091A6D449A7288D7344E80CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 407d0f507318a70fa99c58c07a6fdbbc6dfd3ab4f99c08930c125211d12509b9
                                            • Instruction ID: 48f2b1317ca74b9342e19f45041b02c6543a71d76dd357348741dece64b3d8a0
                                            • Opcode Fuzzy Hash: 407d0f507318a70fa99c58c07a6fdbbc6dfd3ab4f99c08930c125211d12509b9
                                            • Instruction Fuzzy Hash: 08113670D05228CBDB10CF99D944BEEB7F2FB48355F1091A6D449A7288D7354E80CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: aac71df68470b1a3fcd0a7e05f0befe81d77ffcd8506e5b1d3f4fca245146175
                                            • Instruction ID: b0b7f6bedfb0f1834946ee85aae523311e6cc320291dca3050af5d4c96d4330a
                                            • Opcode Fuzzy Hash: aac71df68470b1a3fcd0a7e05f0befe81d77ffcd8506e5b1d3f4fca245146175
                                            • Instruction Fuzzy Hash: 92113670D05228CBDB10CF99D944BEEB7F2FB48355F1090A6D449A7288D7344E80CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: e067894e186d541b0eb196a4d9deaafbc55ae884601237bed2356eeb2efd638d
                                            • Instruction ID: b0b7f6bedfb0f1834946ee85aae523311e6cc320291dca3050af5d4c96d4330a
                                            • Opcode Fuzzy Hash: e067894e186d541b0eb196a4d9deaafbc55ae884601237bed2356eeb2efd638d
                                            • Instruction Fuzzy Hash: 92113670D05228CBDB10CF99D944BEEB7F2FB48355F1090A6D449A7288D7344E80CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: cef8dfbebb0dc28b6c3f3c045a8b4d1db886035eb2abb10b377118b83e7c0eb8
                                            • Instruction ID: 2f709449588b7863081f348830e5b142de7ffecd66e12811bc8bcca0900ce1f4
                                            • Opcode Fuzzy Hash: cef8dfbebb0dc28b6c3f3c045a8b4d1db886035eb2abb10b377118b83e7c0eb8
                                            • Instruction Fuzzy Hash: 70113670D05228CBDB10CF99D944BEEB7F2FB48359F1091A6D449A7288D7344E80CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 4c3899411f1baae200a9c7734ecd5371b4ab59ef2cc69498bd4076165bdb7528
                                            • Instruction ID: af769ea07a25a59960df8b7323a0b9b628f4babe1b750a2f3b70629570c1e042
                                            • Opcode Fuzzy Hash: 4c3899411f1baae200a9c7734ecd5371b4ab59ef2cc69498bd4076165bdb7528
                                            • Instruction Fuzzy Hash: FF113670D05228CBEB10CF99D944BEEB7F2FB48355F1091A6D449A7288D7344E81CF14
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: !
                                            • API String ID: 0-2657877971
                                            • Opcode ID: 30034ecd010f9aa88941859080e717c28d72332656caab1cd79e2de68f1d7940
                                            • Instruction ID: ed4b6a6196cd32ec206bffc6408afa5f3e94d9815dc209f9096cd3026cf6b2ae
                                            • Opcode Fuzzy Hash: 30034ecd010f9aa88941859080e717c28d72332656caab1cd79e2de68f1d7940
                                            • Instruction Fuzzy Hash: 27F0B270A10129DFEB50CF28C885BAABBB5FB44308F049694E81DE7345DBB4AE858F40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: W
                                            • API String ID: 0-655174618
                                            • Opcode ID: 34a88f56c1cccc847aa1210a58b21dea731c64be244f798e26ef9aaf60cf1a3b
                                            • Instruction ID: ada437d5db29d3aa39badb0a4879617f82bb35242680a641f7a61ce8fcc737fc
                                            • Opcode Fuzzy Hash: 34a88f56c1cccc847aa1210a58b21dea731c64be244f798e26ef9aaf60cf1a3b
                                            • Instruction Fuzzy Hash: 72F03A74B00218CFC750CF58E894A5ABBB9FB88310F5080D4E50EA7744CB74AE84CF40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: 21163d732382bcdca46857a6fceb86c4c68af92143638d5864d59f5a397735a5
                                            • Instruction ID: 8d6ef06209f1dd2c34145299ddac51004baf5ab58738deb28ba92ac7b43869e2
                                            • Opcode Fuzzy Hash: 21163d732382bcdca46857a6fceb86c4c68af92143638d5864d59f5a397735a5
                                            • Instruction Fuzzy Hash: AED05E78D052258FDB04CF14DC99AFDBF71FB16214F00429AE851A7292EB38A801CB50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: ,
                                            • API String ID: 0-3772416878
                                            • Opcode ID: e2dc72d77a7d7ea984ab3933946e94822834cc82f492acfeeb585eba92fd78c8
                                            • Instruction ID: 43f9fad93cef18906baf94a0c32ce945c783caba20d1770b68e80fe0c7d90cba
                                            • Opcode Fuzzy Hash: e2dc72d77a7d7ea984ab3933946e94822834cc82f492acfeeb585eba92fd78c8
                                            • Instruction Fuzzy Hash: CCD05E74E44119CBDB00CF55E844A6E7B72FB59308F005014D105A7284CB749800CF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #
                                            • API String ID: 0-1885708031
                                            • Opcode ID: 87feb72ddc3b63196569cbce68e726eaa5c4456d1248c1fa610e020a7cdadbbd
                                            • Instruction ID: de55edaa4cdd0cdc121e6a300fc8bd83138a666852d1436cbac2e6a42f67076d
                                            • Opcode Fuzzy Hash: 87feb72ddc3b63196569cbce68e726eaa5c4456d1248c1fa610e020a7cdadbbd
                                            • Instruction Fuzzy Hash: CBD05E789042588BDB90CF60D41839A7EB1EB54700F105096910963380CF784AC0CF40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: jjjjjj
                                            • API String ID: 0-3900813449
                                            • Opcode ID: 51fa9b748137a676e2b9634a600266ba2ebfbfb58b8454fa52b4b3d95a5764f8
                                            • Instruction ID: 7e360e9005178eb7c9217baf5d579ba75ebd4d580f54e72a3ebe22ee66bebe3e
                                            • Opcode Fuzzy Hash: 51fa9b748137a676e2b9634a600266ba2ebfbfb58b8454fa52b4b3d95a5764f8
                                            • Instruction Fuzzy Hash: 81B012B1505300CF8B01CE09C1C0538B3B0FF92242355806EC0830E811C7348583EB02
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fbe6ab4b16c2f13d0dff5e6fc11cf237971fa82931dbee4ee8f59575787bbae1
                                            • Instruction ID: 583c66ad9e77d1f91a7f6fd8f5bfce2297387ffb45292d66a4c20bd18eb2d074
                                            • Opcode Fuzzy Hash: fbe6ab4b16c2f13d0dff5e6fc11cf237971fa82931dbee4ee8f59575787bbae1
                                            • Instruction Fuzzy Hash: 33521875A002288FDB64DF68C981BEDBBF2BF88310F1545E9E509A7351DA709E81CF61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3b67a2d6c771a0758464965ec5a6b759607a04b299737af1087e509312031824
                                            • Instruction ID: a36d999c5ca555e6a4396ffb593ec2052a826ea2e73d2e2470e6e796597b5ce0
                                            • Opcode Fuzzy Hash: 3b67a2d6c771a0758464965ec5a6b759607a04b299737af1087e509312031824
                                            • Instruction Fuzzy Hash: 70225C35B102049FDB04DFA5D494AA9BBF6FF88310F148469E906EB355DBB1EE80CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f407032f353b907a9eb8abe7765f1965609fe2f7f1c22a75b95ee67e419f96a8
                                            • Instruction ID: 1cee17c62c7993dcb2a7cf18649660232dabc726d3eb3458705ae570a7e6f05d
                                            • Opcode Fuzzy Hash: f407032f353b907a9eb8abe7765f1965609fe2f7f1c22a75b95ee67e419f96a8
                                            • Instruction Fuzzy Hash: 3A42C3B0902209DFD750CF09D688A58BBF6FB80305F6AD999D4294B362D3BADD84DF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d5df06b2bc5799c000ba7121a15533546adadfe2032ee1c3531e9ce3abed8245
                                            • Instruction ID: fc8490d048cf36f677883988c8023f45626bbfcd10102fc2dff4e7b4141a979d
                                            • Opcode Fuzzy Hash: d5df06b2bc5799c000ba7121a15533546adadfe2032ee1c3531e9ce3abed8245
                                            • Instruction Fuzzy Hash: 4F126C30A00205DFDB25DFA9C484AAEBBF6FF88310F14896DE40A9B355DB75AD45CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e4d1980a83a55e46438b712f72c2ef5e2d79bb93b2593b21e38d8862bbce1857
                                            • Instruction ID: fa516a496ba9e80e7be4c17fc27cf9db0e2132dd337ce06da4fef7977b532cbd
                                            • Opcode Fuzzy Hash: e4d1980a83a55e46438b712f72c2ef5e2d79bb93b2593b21e38d8862bbce1857
                                            • Instruction Fuzzy Hash: 0612ED34B102198FDB14DF64C894BADBBB2BF89300F5189A8D54AAB355DF70ED85CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 62fb8e2aa8fdeb8883ee25dfff874aeb0dc67f60ffa00d42d0779590f92e4954
                                            • Instruction ID: 051a0dec1b6b12bf64a0625904e395668a855b2188dac0dfa433aed3c47e0b30
                                            • Opcode Fuzzy Hash: 62fb8e2aa8fdeb8883ee25dfff874aeb0dc67f60ffa00d42d0779590f92e4954
                                            • Instruction Fuzzy Hash: 2E125DB0902208DFE750CF09D749A54BBF5FB41309F5A9899D4294F2A2D3BADD88DB50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a9461f190dfad76a1074b0be6873095191f5ddad717c493728abff4513e41dd8
                                            • Instruction ID: 1636b16a29c3c4352d640f426c86da6e1541a03a476191a91f8172d92fe197ce
                                            • Opcode Fuzzy Hash: a9461f190dfad76a1074b0be6873095191f5ddad717c493728abff4513e41dd8
                                            • Instruction Fuzzy Hash: 79E17C35B402049FDB14DFA8D459BAEBBF2FB88314F248469E95ADB290CB71DC41CB94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5a6609c052690874e42d5a413c456c4ac2ebb5ad5245d8caeb7b98f651a02736
                                            • Instruction ID: 0680bd87b20767aebbcb265c052c3e7fc27e1dd36bc81d7b017291354612e1df
                                            • Opcode Fuzzy Hash: 5a6609c052690874e42d5a413c456c4ac2ebb5ad5245d8caeb7b98f651a02736
                                            • Instruction Fuzzy Hash: 07F1A934A10118DFDB05DFA4D998AADBBB2FF88300F558559E506AB3A5DB71EC42CB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f7768222751ebc70e4cdc88d61d53ee50cd1e9235def3f3756978193b766d631
                                            • Instruction ID: 04c0c1365208a60b965b4d9bd9a458a1aaacf331abf75693c47b7999a4a670fe
                                            • Opcode Fuzzy Hash: f7768222751ebc70e4cdc88d61d53ee50cd1e9235def3f3756978193b766d631
                                            • Instruction Fuzzy Hash: 85D1B075A0620ACFCB04DF98D890BAEB7F5FF84300F158D66E506AB241D770E945CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144117092.0000000005BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5bb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5b14f750f56fb76f25af175403abbbc9e7f3919a14f6e76a8aeb3f51c341457d
                                            • Instruction ID: 346507ace7986552a29ded9fe601eeae72b239aed0931500968bb614e22cbb87
                                            • Opcode Fuzzy Hash: 5b14f750f56fb76f25af175403abbbc9e7f3919a14f6e76a8aeb3f51c341457d
                                            • Instruction Fuzzy Hash: 2CF1BC34E01218DFDF18DFA4E5886EDBBB6FF89316F2044A9E406A7251DBB46981CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 15a3df8392d9107f95b624e15e0ebf85eec492e974ef40974c4e8331d69033e2
                                            • Instruction ID: 87f9e583e3a164ee119aa2c5f67901c7099cc61ef5045259af9ef8854155a62c
                                            • Opcode Fuzzy Hash: 15a3df8392d9107f95b624e15e0ebf85eec492e974ef40974c4e8331d69033e2
                                            • Instruction Fuzzy Hash: 03E11034A00209DFDB05EFA4D4949ADBBB2FF89310F508969E906AB364DF70ED41CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6d8fda44c2f60e92d7a3eab6302352cd44ffec3dddb15c5c9fe2bc15d58d381d
                                            • Instruction ID: d7d73a92e83f97df19cd3b9f0a794be31819f7d92014c4c0bd00f16c5b9021e2
                                            • Opcode Fuzzy Hash: 6d8fda44c2f60e92d7a3eab6302352cd44ffec3dddb15c5c9fe2bc15d58d381d
                                            • Instruction Fuzzy Hash: E7F17FB0902208DFE750CF09D648A58BBF5FB41309F5A9899D4294F7A2D3BADD88DF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ed89ad8f6a23c2453eb87e280b2cfe5bcf17e04735c0c5d5f202fe8336f5271b
                                            • Instruction ID: 558ecdec5901cea098d900e38ad25b6e33624cb303bdc46fdc44eb373d160bc2
                                            • Opcode Fuzzy Hash: ed89ad8f6a23c2453eb87e280b2cfe5bcf17e04735c0c5d5f202fe8336f5271b
                                            • Instruction Fuzzy Hash: F0C15174A001288FDB14DBA8C995BEDBBF6FF88310F158099E509AB355DA709D81CFA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e1afb68f92f5a4079190a545644776b0f4a82e67731460b3c739623a39f6c2a9
                                            • Instruction ID: 174039b0aef761fc52da1331a637600c83759d9bc1f8f976cd6720d1842b6ad7
                                            • Opcode Fuzzy Hash: e1afb68f92f5a4079190a545644776b0f4a82e67731460b3c739623a39f6c2a9
                                            • Instruction Fuzzy Hash: A1910234B002188FDB14DF69C494AAE7BF6BF89710F1484A9E506CB3A5DBB0ED41CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ecbf87ede4d52d8c1ccf1537d79d87548c03dde9761e11f019d3f06d9c13dd48
                                            • Instruction ID: 293170d810ee6e0beda842cc7ee143f3baad034b01e753a90c0bf6ee6eb0f577
                                            • Opcode Fuzzy Hash: ecbf87ede4d52d8c1ccf1537d79d87548c03dde9761e11f019d3f06d9c13dd48
                                            • Instruction Fuzzy Hash: 7281BF34B002489FC704EBB9D458A6DBBF6EFC9324F148469E409DB3A1DBB49C46CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e15ff4b9fd2e9fb40dad68e6db693fe406140914279591acb17bbfab3273422a
                                            • Instruction ID: d3b04c73fbe2a68be196fea35337ae0ce96737676ae2b8e208266e4af955c866
                                            • Opcode Fuzzy Hash: e15ff4b9fd2e9fb40dad68e6db693fe406140914279591acb17bbfab3273422a
                                            • Instruction Fuzzy Hash: DD719276600100DFDB469BA8C814E697FF7FF99314B1A80A9E6498B2B2CB31DC12DB55
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a9e2af2c8080009c7c4e99b51df77220a20ad15a32ee08012114187b0a07ca49
                                            • Instruction ID: 072d9823ae4e1a012fa9e3aa06ab590f71493d23b38a8a88b108c343442afc5d
                                            • Opcode Fuzzy Hash: a9e2af2c8080009c7c4e99b51df77220a20ad15a32ee08012114187b0a07ca49
                                            • Instruction Fuzzy Hash: 23A1DD34B10218DFDB04DFA4D898AADBBB2FF88310F558559E406AB365DF71AC46CB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1dbea3b0c25cf16bc9da012cfe1fa829db860fb834b5777afb593396523eb940
                                            • Instruction ID: 80cda27d58650818c954735d5cfbf351476053b5e5876aef7924b417b645c2e8
                                            • Opcode Fuzzy Hash: 1dbea3b0c25cf16bc9da012cfe1fa829db860fb834b5777afb593396523eb940
                                            • Instruction Fuzzy Hash: 3D813A34B10214CFDB05DF68D898AADBBB6BF88710F1444A9E546DB3A1DB71ED42CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cbf936f67d5d5113db8aae302194af61c6296109b54b081ad5d933beedfbab6b
                                            • Instruction ID: ede64f3446ead799bf0962733fa161b297de075ba7de0cd3bf8845a74a7d1e09
                                            • Opcode Fuzzy Hash: cbf936f67d5d5113db8aae302194af61c6296109b54b081ad5d933beedfbab6b
                                            • Instruction Fuzzy Hash: FD9129B4E01208DFDB40CFA9E4846AEBBF6FB89304F209029D859A7344DB749E45CF94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8fca775c5ddfa3d4bc7d6acefe1931ec75142cf29b99ff1bbb4f9198933d472c
                                            • Instruction ID: 9d83079ab1f44fab6892c3bf9626111c4c052b5728c48206a6df01f81f5d6bb1
                                            • Opcode Fuzzy Hash: 8fca775c5ddfa3d4bc7d6acefe1931ec75142cf29b99ff1bbb4f9198933d472c
                                            • Instruction Fuzzy Hash: C7715E31F046099FEB14DFA9C5406EEB7F6BFC8610F248869D40AA7344DBB4AA01CB51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a507b06f06d661b9f1f2b906d3580d645c8da4e1eea2ac15892dfae1cd90e378
                                            • Instruction ID: ff7e360addd7669a9e580986b8f4e3ccd0807d3347f6621bf1671892087fa510
                                            • Opcode Fuzzy Hash: a507b06f06d661b9f1f2b906d3580d645c8da4e1eea2ac15892dfae1cd90e378
                                            • Instruction Fuzzy Hash: 1C9107B4E01208DFDB40CFA9E4846AEBBF2FB89314F209029D859A7344DB749E45CF94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4230cdb22336520c214fb71fb8a8b6710f64cdf99011b75a0efe641552427af8
                                            • Instruction ID: 1732249247402b2d70175f9d6a5c04bebf1765e75334d0eadf7818ef240edef8
                                            • Opcode Fuzzy Hash: 4230cdb22336520c214fb71fb8a8b6710f64cdf99011b75a0efe641552427af8
                                            • Instruction Fuzzy Hash: B4810539A00618CFDB15DFA8C484E9EBBF9BF88310F158569E8569B360DB70ED41CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2cee1683fe0b8de1b50d8be8f47600ee9ec866daa32c14cfc916e7f255616d7b
                                            • Instruction ID: ae95027e0c700fb74b878c882da302f0f93cbbe58b14736905709066d50172dc
                                            • Opcode Fuzzy Hash: 2cee1683fe0b8de1b50d8be8f47600ee9ec866daa32c14cfc916e7f255616d7b
                                            • Instruction Fuzzy Hash: 735187317006058FEB199F68D854BAE3BA2FBC4750F148569E8068B3A5CF75DD42CBD0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2241aa83f48dc30eda828fb5a6d787f192f65cc3a2c8fa9073da3b7bc5261b94
                                            • Instruction ID: d93386d7c9c66f6d6c59aabfa7c803177e3dd6ba4c40b92f0d52475471f45595
                                            • Opcode Fuzzy Hash: 2241aa83f48dc30eda828fb5a6d787f192f65cc3a2c8fa9073da3b7bc5261b94
                                            • Instruction Fuzzy Hash: DB5189357002058FE719AF78D454A2EBBB3BFC9211B2484ADD8569B3A4DF31DC42CBA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c9fc463c3f127b28ba2322251b0838d7d66c7e27cb80804253e92fefd494b58a
                                            • Instruction ID: 0aab5a7986d9f9d92aa81e777a53fbd90d0a816ad22d189188e3e238a0696111
                                            • Opcode Fuzzy Hash: c9fc463c3f127b28ba2322251b0838d7d66c7e27cb80804253e92fefd494b58a
                                            • Instruction Fuzzy Hash: 5971E2B4E0120DDFDB44DFA9E45469EBBF2FB88300F108029D51AAB398DB749A85CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f45e2c1d99f44e7479c344ed4a7558afcd38fc518069415a3c9b7f2b66ef43d1
                                            • Instruction ID: 674771203c168d9a3cdc5e9061c6738eede5f1d14fedd57dbfd3a97f5a3c89ed
                                            • Opcode Fuzzy Hash: f45e2c1d99f44e7479c344ed4a7558afcd38fc518069415a3c9b7f2b66ef43d1
                                            • Instruction Fuzzy Hash: A1711B74E00218DFDB54DFA9E554B9EBBB2FB88304F209029D949AB384DB749E85CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a8043b0a3871a5435f0666ba059defb401b2ddf4a0715f412f0edb60fdb33a1d
                                            • Instruction ID: 6079906b275fd5067e00d21ec24fe29a0fa401c4b00f31a6a2d1f40a70095c5e
                                            • Opcode Fuzzy Hash: a8043b0a3871a5435f0666ba059defb401b2ddf4a0715f412f0edb60fdb33a1d
                                            • Instruction Fuzzy Hash: 0C613D74B10214DFDB04DFA8D898AADB7B6FF88710F1445A9E506AB361DB70ED42CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c9a68c9d5850ed88a2981d5355f9dbdb8822cba5b3ec06eeba88c6adc842b0a8
                                            • Instruction ID: 80d758ce4317503bb0e040b7686e3a96d45fcc6db0e7eec9dec1044d8310f466
                                            • Opcode Fuzzy Hash: c9a68c9d5850ed88a2981d5355f9dbdb8822cba5b3ec06eeba88c6adc842b0a8
                                            • Instruction Fuzzy Hash: 0D610B74E00218CFDB54DFA9E59479EBBB2FB88304F208169D949A7344DB749E86CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6e3a8a302c2b3a2538b0bbcb8437e6dfa90148cc8a8ab94b816ac27c57db88d1
                                            • Instruction ID: 63fcfc37f82d9616aac67403b1feb584707ceb20976e205bae2d88bca2054227
                                            • Opcode Fuzzy Hash: 6e3a8a302c2b3a2538b0bbcb8437e6dfa90148cc8a8ab94b816ac27c57db88d1
                                            • Instruction Fuzzy Hash: FE51CE31A042168FCB10DF68D484A7AFBB2FF85320F65869AE959D7281C730EC52CBD4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cda6070b1393d358e3855090295f47f99d411ade6968e6f2b6e2c44ac5eeead4
                                            • Instruction ID: 512aa015632c5b316a507cbe1a98bc0fce4da4866cb5e3e2b440efd114adc915
                                            • Opcode Fuzzy Hash: cda6070b1393d358e3855090295f47f99d411ade6968e6f2b6e2c44ac5eeead4
                                            • Instruction Fuzzy Hash: 97511570E05219DFDB04CF99D484BEEBBFAFF89314F10A029D545A7348EBB45A858B80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b95af6b8a7dbc74da4bf81e90832cff510fb1c77ec288c3c00df3013794dc94d
                                            • Instruction ID: b15059314938556d32f79b384a62a4207b51e705b7c28ee41762208c0665da33
                                            • Opcode Fuzzy Hash: b95af6b8a7dbc74da4bf81e90832cff510fb1c77ec288c3c00df3013794dc94d
                                            • Instruction Fuzzy Hash: E8514B76600104EFCB459FA8D804D297FB7FF8C32471A8098E2098B272DA32DC62DB51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 39cde4d6a1aa461d9b43a6033468efccc9a8c32908eb374b1bc1cdc5e078e653
                                            • Instruction ID: cfcb7dfddb20b32a625f4c83395b0b7d25c60e1a1260356a7bb186694861fc65
                                            • Opcode Fuzzy Hash: 39cde4d6a1aa461d9b43a6033468efccc9a8c32908eb374b1bc1cdc5e078e653
                                            • Instruction Fuzzy Hash: C2512370E40218DFDB84DFA9E984AEEBBF6FB8A310F009429D615A3340DB745985CF80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 12bf273f8038caee06378936586face0ae1e60cf10e1d7e594bbb7f67f1f5125
                                            • Instruction ID: e4cb2d10d079caa61ff04ccdb8606f01f009e7a0f11ecaab25739231eb13cbe5
                                            • Opcode Fuzzy Hash: 12bf273f8038caee06378936586face0ae1e60cf10e1d7e594bbb7f67f1f5125
                                            • Instruction Fuzzy Hash: 3D517B38A06704CFD7A8CF69D44075AB7F6FB85350F008E6AC44787695DB74E985CB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 48975f34e76df348676d97a951fd3bb6878bd4b30c214561c63ee223205adb13
                                            • Instruction ID: cd6504c0cb600c35500222d8c222218ba6952ba66d26cc6a2fe73600b5f906ac
                                            • Opcode Fuzzy Hash: 48975f34e76df348676d97a951fd3bb6878bd4b30c214561c63ee223205adb13
                                            • Instruction Fuzzy Hash: 4C418A313042198FDB489F39C854A6E7BE6FFC8610B158469E946CB3A1CE34DE02CBA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 59a8800796f9330fbdbaaef4bf433e4d0cdec16a35e95fdaad8346650d70610f
                                            • Instruction ID: 432bb3849fb2f18f10be838ce23cafb564b9f2d97beb9a362e037aed271ef975
                                            • Opcode Fuzzy Hash: 59a8800796f9330fbdbaaef4bf433e4d0cdec16a35e95fdaad8346650d70610f
                                            • Instruction Fuzzy Hash: DC515B34B106199FCB14EBA4E458ABEBBB6FF88701F008559F502973A0EF749946CBC1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c1e7ee8df34c8e82f733714ff2b798ad11a8c48e2a06a9e64c1d801f99cc8ec1
                                            • Instruction ID: e0935bf5f87991bdc3d28bbf736547149dbf9e821737c686fac272b433bfe2bd
                                            • Opcode Fuzzy Hash: c1e7ee8df34c8e82f733714ff2b798ad11a8c48e2a06a9e64c1d801f99cc8ec1
                                            • Instruction Fuzzy Hash: B34180367042049FDB059FA8E854E997FB6FF89720B1580E6E509CB272CB31DC12DB50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2e21730fffa5d79aee27b7c4e93af1a9c61295d01d0939ea5ca572dab44b7a5e
                                            • Instruction ID: 026b92899720ccc6ff0544bff39daae7a5da47a0a61c9c2848b9a6781478ae55
                                            • Opcode Fuzzy Hash: 2e21730fffa5d79aee27b7c4e93af1a9c61295d01d0939ea5ca572dab44b7a5e
                                            • Instruction Fuzzy Hash: 00415230B106148FDB05ABA4C4A8AAEB7B7AFC8710F504829E50697394DFB49D46DB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 10bd4a6e440a314f654ff14849e233a6e73039ed480c0483bea6c16506ae59ab
                                            • Instruction ID: c07145be46a1a4c4fb66cdf5916475a95ae13de468169919741fdd57bdbf9858
                                            • Opcode Fuzzy Hash: 10bd4a6e440a314f654ff14849e233a6e73039ed480c0483bea6c16506ae59ab
                                            • Instruction Fuzzy Hash: 4A510670E05219DFDB04CF99D4847EEBBFAFF89304F10A029D555A7248EBB45A858F80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2fe63d745852aa1f611ff3867ed863d58807569f4fa21496e4a78db13e84ab51
                                            • Instruction ID: 759c459a8e195cf2eb17af4afb022049e0b598f34a40b351ce802350a81989f3
                                            • Opcode Fuzzy Hash: 2fe63d745852aa1f611ff3867ed863d58807569f4fa21496e4a78db13e84ab51
                                            • Instruction Fuzzy Hash: 2551F1302047058FE325DF3AD48031A7BE6EFC4320F109A2DD59A8B7E5DB749945CBA9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 41162cbe37b752285934cfbcb6ded972109ad292a001d3df22bd73831517b13e
                                            • Instruction ID: c7c8d603084444fb869a311debfa202f90f5d11a7cc51fb4606235bc4a6a05c1
                                            • Opcode Fuzzy Hash: 41162cbe37b752285934cfbcb6ded972109ad292a001d3df22bd73831517b13e
                                            • Instruction Fuzzy Hash: 0C513970909268CFDB10CF95C844BAEBBF2FF49304F10A0AAD449AB259DB749D85CF45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c8a5498f8195e46aca195d1f61b60f3560d1253f3d2022956161728e228e50f7
                                            • Instruction ID: 433cfb1dec7218ca2d3d87efd9b86e9ff9dc9f1ca94993f9677dcfbb39b4da16
                                            • Opcode Fuzzy Hash: c8a5498f8195e46aca195d1f61b60f3560d1253f3d2022956161728e228e50f7
                                            • Instruction Fuzzy Hash: 1351BF7591421DDFDB10CFA8D884BADBBF2FB09318F08919AE808A7341C774A984CF54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c053d24029f36e94dd55538e13d7525ac2fead0b283577ab5c70f4d3c6b3d045
                                            • Instruction ID: 2720ddd1789b4190c518fb4af2c19fa9b331b02a313b9f4e55b8b9844e7dad3e
                                            • Opcode Fuzzy Hash: c053d24029f36e94dd55538e13d7525ac2fead0b283577ab5c70f4d3c6b3d045
                                            • Instruction Fuzzy Hash: 06418030B1130A8FDB9CEBB9D41066EB7E6EFC9250B288569D5079B284DF35DD428BC1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b8aa67c7dea4af2dd1326af6ebe38dd1e0bcf530a2ded94ea2646a3aa18b43c3
                                            • Instruction ID: c79d427f52d8fe59049dffffa9f9cd50ae7203a7f3c5a975ea8b291134e5c3ef
                                            • Opcode Fuzzy Hash: b8aa67c7dea4af2dd1326af6ebe38dd1e0bcf530a2ded94ea2646a3aa18b43c3
                                            • Instruction Fuzzy Hash: 8B412630B04305AFDB24DFA8D844BAEBBF6FF85710F10446AE54AD7290DBB0A905CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ffe57e968246fa5ca5a9b0a55fd76ea0a8c26ddb2f22cd71545acd5391c90f2f
                                            • Instruction ID: c40c203444abc344dc5cb93460ff5f1db6f97eb6707b759b753d29d1ad67f038
                                            • Opcode Fuzzy Hash: ffe57e968246fa5ca5a9b0a55fd76ea0a8c26ddb2f22cd71545acd5391c90f2f
                                            • Instruction Fuzzy Hash: A7416AB5A047459FDB24CFA9C588BAABBF2BF88300F18895DD48697A50DB70F904CF51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b30ae6fc8a1e45dd387c6adc576848ab2067633325f8a9a479972f2c7b614666
                                            • Instruction ID: 9eaab6c096c9c3518b6bbb3ce86b9be6de13e0ad5d5c66075cbc3e83b5bb6c77
                                            • Opcode Fuzzy Hash: b30ae6fc8a1e45dd387c6adc576848ab2067633325f8a9a479972f2c7b614666
                                            • Instruction Fuzzy Hash: 5A414F753006109FE709DBA8C858F6A7BEAAFC8714F104559E206CB3A6CFB5EC42C791
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 635bdc1b473051d748b5383799594d3d78ab5acfbf1e50b3fde7a0277b2a4b65
                                            • Instruction ID: 02725247e961f06ad5586eb82759c55097f9f183ac4ccc54a234f1c3550e0845
                                            • Opcode Fuzzy Hash: 635bdc1b473051d748b5383799594d3d78ab5acfbf1e50b3fde7a0277b2a4b65
                                            • Instruction Fuzzy Hash: 44411B74D04208DFDB04CFA9D844BAEBBF6FB49300F1481A9E819AB351D7B5AA45DF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 294a03d76fef3c0ae2914f5f45cf7e9820cf248512f7e0b23f742ced381e95fa
                                            • Instruction ID: af3967333c0a2954477cc7d4668d351125a3345b9bf52f59c3803f22f50a4a30
                                            • Opcode Fuzzy Hash: 294a03d76fef3c0ae2914f5f45cf7e9820cf248512f7e0b23f742ced381e95fa
                                            • Instruction Fuzzy Hash: 40313E353006109FE708DB69C858F6A7BEAEBCC714F104468E60A8B3A5DFB5EC42C791
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: af4e52f950f63d98fc385c7c5692d1a3faa8c9f2b962d99b21572915621ef649
                                            • Instruction ID: eb2bb826f4097b2ac4007a7d69cb2e1f370c6b15c4ab762b87f21512ff1c39df
                                            • Opcode Fuzzy Hash: af4e52f950f63d98fc385c7c5692d1a3faa8c9f2b962d99b21572915621ef649
                                            • Instruction Fuzzy Hash: A0311536600104DFCB04CF99E888EA9BBB6FF48320F0640A8E6099B372C772ED51CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a32c3fb7967777a5ffc3e65685df6f3abcdc2397ce3f0ebc162aa0d1634cccc6
                                            • Instruction ID: 8c111c514e7e190b9a316918006188a6d3a0ca6d930106737f57563f41dffa65
                                            • Opcode Fuzzy Hash: a32c3fb7967777a5ffc3e65685df6f3abcdc2397ce3f0ebc162aa0d1634cccc6
                                            • Instruction Fuzzy Hash: A8418B71A002158FDB10DFA5CE44ABEBBB2FF88354F40806AD896E72A0D775D946CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 509101f0e9afa08ded6719c455c3ae94b8b632c0047f2590f76e86d1b37e525d
                                            • Instruction ID: 03b2b9e78d0e4e8053cc1f94a6ed5ffcc41417b3853f06d3cb87967253ca8dc5
                                            • Opcode Fuzzy Hash: 509101f0e9afa08ded6719c455c3ae94b8b632c0047f2590f76e86d1b37e525d
                                            • Instruction Fuzzy Hash: 2741A275E012099FDB08CFA9D495AEEBBF2FB89310F108129E915A7350DB75AA41CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7162d0284e018a670207c0bf8e3ce45134b4618b6ecf37d9229d08c1b8131079
                                            • Instruction ID: 26e3ed78bf06f2558ae4e1be43bd55157edb46c5565fc97963ade684105b2078
                                            • Opcode Fuzzy Hash: 7162d0284e018a670207c0bf8e3ce45134b4618b6ecf37d9229d08c1b8131079
                                            • Instruction Fuzzy Hash: D531B476A00208DFDB15DBA9D840ADEBBFAFFC9310F00456AE546DB250DB70AD45CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9ef161700d721d9e30c8005a72d22ab8a1574d6bfebf6c1566684d17cdf5ca2b
                                            • Instruction ID: 9d827ea2f95c456f584694ce1315ad90b21fbda3eb17daaeea03f97f5e919fd6
                                            • Opcode Fuzzy Hash: 9ef161700d721d9e30c8005a72d22ab8a1574d6bfebf6c1566684d17cdf5ca2b
                                            • Instruction Fuzzy Hash: 7D21E435304215ABDB159B6DE884A6E7FAAEBC9364F544039E909CB390DF718C15C7E0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 16be3158e8d291ed668dd1b03ea9c4df05715e21697b44ec18fadc311289ac71
                                            • Instruction ID: 0cbedc3f5d7a6cda0d0b5a6d1d721c737dd803a6cb55d91133fcce3cbdbbf1e3
                                            • Opcode Fuzzy Hash: 16be3158e8d291ed668dd1b03ea9c4df05715e21697b44ec18fadc311289ac71
                                            • Instruction Fuzzy Hash: E9318130B02305CFCB9CDA69E50067EB7E6EF8A240F1884A5D50797244DF35CD428BC2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 119570a16c42c45c1f8d454cde516a034534af63ddd1482a8e2b95a19c7be9ad
                                            • Instruction ID: d53a2345da87ae3dd91218857d978895c34fca72449ebf0e945512c19380dac1
                                            • Opcode Fuzzy Hash: 119570a16c42c45c1f8d454cde516a034534af63ddd1482a8e2b95a19c7be9ad
                                            • Instruction Fuzzy Hash: 013152356001149FCF059FA4C8849A97FB7FF8D310F0544A9EA099B361DA71DC56DB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f034aed0920d237c168ebc8bada2c71f7a6c85e4aeaf511dabb8710671345450
                                            • Instruction ID: caabc2c97bb623e9e02e8c8e3db4d48355957707029ba2f263e74b1500c7153c
                                            • Opcode Fuzzy Hash: f034aed0920d237c168ebc8bada2c71f7a6c85e4aeaf511dabb8710671345450
                                            • Instruction Fuzzy Hash: AA411475A412288FEB24CF24CDA1FA9B7B2FB48710F1051D5E94AAB390C631EE81CF54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 565cead9d091f644a87981c6e52203170b901c28d20bec529f9bb0dc411bde9e
                                            • Instruction ID: 9ffd42f094d1aed7ff3165d7284effa08689a01d2e162872559325900f58edd7
                                            • Opcode Fuzzy Hash: 565cead9d091f644a87981c6e52203170b901c28d20bec529f9bb0dc411bde9e
                                            • Instruction Fuzzy Hash: 413128B5E05219DFDB48CFAAD9856EEBBF6FB88300F108429E515B3240DB749E41CB94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8664cc03f446322c41c15d8cba8551ff2e333f63771d8356ab3d3242ad73f5b0
                                            • Instruction ID: f9c0150c0864e224cd91e105a8b8b8d0e1a8feeaad48ae2ee7704e4eeb315d28
                                            • Opcode Fuzzy Hash: 8664cc03f446322c41c15d8cba8551ff2e333f63771d8356ab3d3242ad73f5b0
                                            • Instruction Fuzzy Hash: 42312875A002199BEB04DFA4D964AEEB7B6FF8C310F108429E942B7390DB719D15CFA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 34c0ef5d5a76e797220ee4b036751cd3b815874f06d1958b948801523dd367b5
                                            • Instruction ID: 1e9408b038d0545f1555cd35bf129f5ff1a23ce5d42ca34a67c59cb433c90277
                                            • Opcode Fuzzy Hash: 34c0ef5d5a76e797220ee4b036751cd3b815874f06d1958b948801523dd367b5
                                            • Instruction Fuzzy Hash: 2121B63170E3059FE7E8CA29D9867AEB7D9EB40394F18193AD442C2280EF65D884C351
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ad86bd0f06879d3ba0d164b95a9ab825de91677fd771cea73c19625cf1187ed2
                                            • Instruction ID: 6ab79c1d45fe5d3e54bb92ac1fcf56805066e1c1ea10a737c8ed6f206f136154
                                            • Opcode Fuzzy Hash: ad86bd0f06879d3ba0d164b95a9ab825de91677fd771cea73c19625cf1187ed2
                                            • Instruction Fuzzy Hash: 5D410570909218CFDB64CF19C944BA9B7F6BB49304F44A0A5D88DA3241DB749D81CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4b02994e056b6a394095f6e38763af85514a33c805d6176e2c0792ff5d0e1f3d
                                            • Instruction ID: 4a6acd9da07df079bc69b73f31e6c6b9b61bae0551240ce0aedc8d4f238c3810
                                            • Opcode Fuzzy Hash: 4b02994e056b6a394095f6e38763af85514a33c805d6176e2c0792ff5d0e1f3d
                                            • Instruction Fuzzy Hash: B531E875E05219DFDB48CF9AD5846EEBBF6FB88300F108429E919B3240DB745A45CB94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e6a2e26cf27b65ec0c2c52696f1988493751b4f5628fa876dfe1e9b9d1a55473
                                            • Instruction ID: 0aaa8f417980b9649bad1ca44af4b0a14e211f5d4b06ad9d8d51dd6fb30ba843
                                            • Opcode Fuzzy Hash: e6a2e26cf27b65ec0c2c52696f1988493751b4f5628fa876dfe1e9b9d1a55473
                                            • Instruction Fuzzy Hash: 11310774E04229DBDB04CFAAD844AEEB7F2FB8C710F149129D865B3254E7749942CB94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4f348fea5c5b5ff21ad1420e4c7e956a54f6e44fda1670ae87655d3bf352b47b
                                            • Instruction ID: 83196e08e85977013688261df6048ffc0d446586ab0a3e63e65add879bd07746
                                            • Opcode Fuzzy Hash: 4f348fea5c5b5ff21ad1420e4c7e956a54f6e44fda1670ae87655d3bf352b47b
                                            • Instruction Fuzzy Hash: 0D310574E04219DFDB04CFAAD844BEEBBF2FF88700F149029E855A3254E7748946CB54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 90104cbae21e342cb226dddd02312e807da1547ae970ebb54ddc71ecfed94730
                                            • Instruction ID: a335e1aaea609c9dd6fe530489ff2f43bbf139aa463867f00052bdb67e78784a
                                            • Opcode Fuzzy Hash: 90104cbae21e342cb226dddd02312e807da1547ae970ebb54ddc71ecfed94730
                                            • Instruction Fuzzy Hash: B6311774A08218CBDF58DF69D8887EDBBB6FB49300F5095A9D40AA7384CB709D85CF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f4703fb8e95b999d0c8d1af2faa01fee29a595b3eb9e0b36e47f7f69aa85da42
                                            • Instruction ID: 451fae0d72f61b973c322f651b0b7040f70404b100146b8dac6597038e50d9a7
                                            • Opcode Fuzzy Hash: f4703fb8e95b999d0c8d1af2faa01fee29a595b3eb9e0b36e47f7f69aa85da42
                                            • Instruction Fuzzy Hash: 3621A4323042109FEB149B69E984AA6B7E5FFC0311F558D7EE50EC7652DB71E882C790
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b22a91fe9ef7cecfbb8933addf2c9b6f08901c8b54642311f6fed1c0efd7a5a4
                                            • Instruction ID: e0f88a6fee99d455eb58ddccac8b12d80162741bb8691079e30546a5b209679d
                                            • Opcode Fuzzy Hash: b22a91fe9ef7cecfbb8933addf2c9b6f08901c8b54642311f6fed1c0efd7a5a4
                                            • Instruction Fuzzy Hash: F2311574E0420CDBDB04CFAAD4446EEBBF2FB88310F149069D919A3341DB749A85CFA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f63d491cde068d89179a548a44ff5ce1abdfefb3b89e29ad8e5418304d0a438f
                                            • Instruction ID: 0a49465cedd943b7816b061e1a810054711b5c95d0782b70ee8609bd8faf59c0
                                            • Opcode Fuzzy Hash: f63d491cde068d89179a548a44ff5ce1abdfefb3b89e29ad8e5418304d0a438f
                                            • Instruction Fuzzy Hash: C93103B0E0820CDBDB04DF9AC4446EEBBF6FB88300F10A069D919A3351DB749A85CF64
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 96b6e21c643e033fd0cd04eece1bdb568f927a9867950facc7ea20e7bb7fce92
                                            • Instruction ID: ea84c720b7058aba9cdd8547bc6da284305e986362dbeff5b18d84794bb2e32d
                                            • Opcode Fuzzy Hash: 96b6e21c643e033fd0cd04eece1bdb568f927a9867950facc7ea20e7bb7fce92
                                            • Instruction Fuzzy Hash: 2F311674D42209CFCB05CFA9C5946EEBBF1FF89300F5598AAC005A7261DB759A85CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 277431605ced4df44a05dd64ed151f3b51aae193cee6115b0ebdaa96322a31b1
                                            • Instruction ID: 52ab33fc7be0b45a7d663b4ae9744701c6dd2d3f1b161e29fd391c48d18ba158
                                            • Opcode Fuzzy Hash: 277431605ced4df44a05dd64ed151f3b51aae193cee6115b0ebdaa96322a31b1
                                            • Instruction Fuzzy Hash: 0931E470D02209DFCB04DFA9C4446EEBBF1FF89300F5498A9D515AB221DB76AA85CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1e46be6657944fbb89112168c079433507e558e42f4bc59d1fced6ce0a52f5c6
                                            • Instruction ID: 094fef4f3c4bd4abbc1caeca5d2cc4acae7304831558b2067557747a70c4d86d
                                            • Opcode Fuzzy Hash: 1e46be6657944fbb89112168c079433507e558e42f4bc59d1fced6ce0a52f5c6
                                            • Instruction Fuzzy Hash: 4F31F3B4D0820CDFDB40CFA9D944BEEBBF2FB89300F1091A9D845A3254E7785A40CB59
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 581b8f0ea059f45bb6deec51abb8479433af8a7273016a67d78c3509bcdef682
                                            • Instruction ID: 2ef3f72bf911c1dc0894e52fd94a2da15e11b772bbff8eb0ac0ebc5d945882dd
                                            • Opcode Fuzzy Hash: 581b8f0ea059f45bb6deec51abb8479433af8a7273016a67d78c3509bcdef682
                                            • Instruction Fuzzy Hash: 763105B4D4220CDFDB40DFA9D5487AEBBF1FB58309F5094AAC515A3240D7B98A848F05
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cf1188b02fd5f80d56081ebd1211993565df82b0062ddad385f38a68d8b87214
                                            • Instruction ID: 1a772488a8d73ba77f8f7478900ec59bd86fbddc1a58c0b85dcfd37b79dc7fb0
                                            • Opcode Fuzzy Hash: cf1188b02fd5f80d56081ebd1211993565df82b0062ddad385f38a68d8b87214
                                            • Instruction Fuzzy Hash: 53313474E01208DFDB05DFA9D840AEEBBB2FF88310F10846AE505AB3A4DB705945CF90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4756fa4bfc0ba40c8043678385f5885c023acb03e03eeecd61074d93e0a517b8
                                            • Instruction ID: b38eb418fb084084972d7e976e0a83f309c59855d3fa8efa27f2c2dde1ac47da
                                            • Opcode Fuzzy Hash: 4756fa4bfc0ba40c8043678385f5885c023acb03e03eeecd61074d93e0a517b8
                                            • Instruction Fuzzy Hash: 65216774F10A09CFDB00EF68D5549AEB7B5FF89700F50456AD50697320EF709A46CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fa1de70060308eb5fa2a113cd9b4fd7e9e7b4c3a4b7a574203f431a28998314d
                                            • Instruction ID: 4b71160c3665d158f85208eb93c39830cad78b235a0fcafcb4688ed6f489e9d4
                                            • Opcode Fuzzy Hash: fa1de70060308eb5fa2a113cd9b4fd7e9e7b4c3a4b7a574203f431a28998314d
                                            • Instruction Fuzzy Hash: 58313AB4D4620CDFD740DFA9C5587AEBFF5FB58309F5084A9C115A3240D7B98A848F15
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 29fac8f3f11a8837295c27246fe041a27c41cc6bc31cd1bc9562e43659cacd52
                                            • Instruction ID: e98b6f402255d576ef7439743a13b91047854316a825c3ef9ceccfed288c7fec
                                            • Opcode Fuzzy Hash: 29fac8f3f11a8837295c27246fe041a27c41cc6bc31cd1bc9562e43659cacd52
                                            • Instruction Fuzzy Hash: 3721C5757003028FE7249BA8D848B6EBBBAFFC4265B00552DE95ACB304EF749C05C794
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a6d061b7046b35eda770ae00e80eada12f680e8aed4e8339b7f65ce76267095b
                                            • Instruction ID: ee7d72db0a8c53591331abbf4a1937563cd78b314a8ec5a00a94faa1bddb6a3a
                                            • Opcode Fuzzy Hash: a6d061b7046b35eda770ae00e80eada12f680e8aed4e8339b7f65ce76267095b
                                            • Instruction Fuzzy Hash: EA31E1B0D0821CDFDB44CF99C944BEEBBF2FB89300F1091A9D849A3254E7784A80CB58
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9a913125859ba387327f418475cbcf3ebd1559f7106639028bf3c5eec06f3901
                                            • Instruction ID: 55582dbe75db3442b0d846e5d3d256e48974193af307197e9087bb22eb4f9fef
                                            • Opcode Fuzzy Hash: 9a913125859ba387327f418475cbcf3ebd1559f7106639028bf3c5eec06f3901
                                            • Instruction Fuzzy Hash: 01214BB1D05208EBDF44DFA9C48DBADBBF9EB45308F5488A9C409A3241E7F58A80CB44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8bb641f557f23e0a06bf4174513c93e170fd40a9314ef3cc0e00ef087a93b520
                                            • Instruction ID: 6e5cc70fb7a90aa7a46290fced692866c06d51e80430bddd1c638df3343cc31f
                                            • Opcode Fuzzy Hash: 8bb641f557f23e0a06bf4174513c93e170fd40a9314ef3cc0e00ef087a93b520
                                            • Instruction Fuzzy Hash: 6C212B74E06209CFDB44DFAAD4443EEBBF5FB88300F149825D515B3284DBB44A818F51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0f8adfdf15211d115168cd35d55f8be76fadda30e399d4622074e93846c47bdc
                                            • Instruction ID: ecdd6386a867ca9d1a66a70b5385c6b2a70689f8ce61358b9658dd9581036652
                                            • Opcode Fuzzy Hash: 0f8adfdf15211d115168cd35d55f8be76fadda30e399d4622074e93846c47bdc
                                            • Instruction Fuzzy Hash: A631C375E0120DDFDF05DFA9D890AEEBBB2FF88310F10946AE505AB264DB359941CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4a91778a097d19c1da4235d2c9af1d5db4e8bc80c545b0063065c1327893c39e
                                            • Instruction ID: f9d6bced0d8d3ee13c2ae25257ad278ecb90c02bda110931dd773942720f0553
                                            • Opcode Fuzzy Hash: 4a91778a097d19c1da4235d2c9af1d5db4e8bc80c545b0063065c1327893c39e
                                            • Instruction Fuzzy Hash: 9D2171313082645FEB118F3AD844BA97BEAFF85611B05446DFC42CB392CA74C901D7A0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bddb15325778d7770253eb808bdf5a08fd0498f3700b90a68fd5b24e6bbe5059
                                            • Instruction ID: 07e7b9e5953a27361933771954a36c9058b04df11976a6f5dab76c14030c1197
                                            • Opcode Fuzzy Hash: bddb15325778d7770253eb808bdf5a08fd0498f3700b90a68fd5b24e6bbe5059
                                            • Instruction Fuzzy Hash: 36215971A00259DFEB00DFB8D804BEEBBF5AF04254F509066D9A9D7290E734CA40CBE5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: acc43bb0ec3fabb142e20ee615ca64c183a0fe057d99e965e15a17468f901b39
                                            • Instruction ID: c66229c09f32c1a7ac75042bf17055ea305818d5b23a6ce89ab3cb4ad2ba25a7
                                            • Opcode Fuzzy Hash: acc43bb0ec3fabb142e20ee615ca64c183a0fe057d99e965e15a17468f901b39
                                            • Instruction Fuzzy Hash: E52129366001049FDB05CF99E898EA9BBB6FF48320B1640A9F6099B272D772ED55DB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128145340.0000000002F4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F4D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2f4d000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8e0a7de3931d5caa22fb913ef9d9f4cfe123c8f4c761fb01eb01e3be553d1f2d
                                            • Instruction ID: 7956d4c7ffd0a65cda2893a90d400267eefc5677cf7131d604f118ad5a8cd507
                                            • Opcode Fuzzy Hash: 8e0a7de3931d5caa22fb913ef9d9f4cfe123c8f4c761fb01eb01e3be553d1f2d
                                            • Instruction Fuzzy Hash: 1A213A72604244DFDB14DF18D9C4B26BF65FB84B54F20C56DDA090B24AC7B6E446CBA2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 11484badf1e70ee7096b383258c93858fc58f80f69342be746adaed554c18953
                                            • Instruction ID: 8b380c6166b6d23cc35873ccb0f2dd97e6a7526c13d93114478452e45bef95e4
                                            • Opcode Fuzzy Hash: 11484badf1e70ee7096b383258c93858fc58f80f69342be746adaed554c18953
                                            • Instruction Fuzzy Hash: E031E474904218CFDB64CF69D848BE9BBF2FB49305F0094A9D119A3281CB749EC4CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b0511d2eaec9707c91f2724e036db882e24e9024645367d47d822d786dda25e1
                                            • Instruction ID: cdb8a13e11332ac43584b13e259c5831cfa925720e3eefdbdb6cd02523b65216
                                            • Opcode Fuzzy Hash: b0511d2eaec9707c91f2724e036db882e24e9024645367d47d822d786dda25e1
                                            • Instruction Fuzzy Hash: FA21CF716102058FD714ABB8D8597BE7FFAEBC8310F44896CE04AD7685DFB49A058BE0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4b535f89288805602182d4660e6b97f9baddb39c0b60fa008137b0c6ddeed630
                                            • Instruction ID: 839817896f3f60a95660f0aac012f6673739297783ba48eee56c5eb840689396
                                            • Opcode Fuzzy Hash: 4b535f89288805602182d4660e6b97f9baddb39c0b60fa008137b0c6ddeed630
                                            • Instruction Fuzzy Hash: EF2149313401559FCB42CF2ADC84AEA7FEAAF89300B059095FD55CB361DA71DC51CB60
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dd38fcf3d19c48db212378f405cea08d1595789ea2b732c40815c44e795bb21c
                                            • Instruction ID: 5ea01ba4f8039ec5b453eb1b40a505c785882c1b8e51c6126bea3b0749e7f922
                                            • Opcode Fuzzy Hash: dd38fcf3d19c48db212378f405cea08d1595789ea2b732c40815c44e795bb21c
                                            • Instruction Fuzzy Hash: 39218931A006168FDB10DFB9CD44AAABBF2BF88344F408469D846D7350EB75E842CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cc1d05bb925bef1834fb23306eb9fa11ee2d7b364940dbff51cccbb71dca91f5
                                            • Instruction ID: 0885b3694fe2634e9141d6579b4460df3271eced851838f859e7862ebe943915
                                            • Opcode Fuzzy Hash: cc1d05bb925bef1834fb23306eb9fa11ee2d7b364940dbff51cccbb71dca91f5
                                            • Instruction Fuzzy Hash: 6A219235A00119DFDB05DFA9C848AEEBFB7EB8C324F149129E816A7390CF719845CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9ff7ca0af69bd4a7655b60239f16c20544706c929635a04966b0569fc0637e07
                                            • Instruction ID: 8ed2c26173c2edc2160d9573120000cde14af9cfd8d3a35df2019b5d4cb38633
                                            • Opcode Fuzzy Hash: 9ff7ca0af69bd4a7655b60239f16c20544706c929635a04966b0569fc0637e07
                                            • Instruction Fuzzy Hash: AC210675A001199FDB04DF94C984ADDBBF2FB88301F2049A9E405BB2A1DB75AE44CBA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5a2de2db0156e2ca1b4076656844b967dde001efe1531d0efb08fbc7eed81f36
                                            • Instruction ID: f782c2406da27de888ee78df656617af077ff24b9d4f3210263966b75e6f6c1c
                                            • Opcode Fuzzy Hash: 5a2de2db0156e2ca1b4076656844b967dde001efe1531d0efb08fbc7eed81f36
                                            • Instruction Fuzzy Hash: E3213874D04249CFDB05DFA9C5486EEBBB6FF88310F28846AD515B3241DBB46A84CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e7d90d203c73457a7cf27df93987b7c96341d0a9a4654e524ce14b9f38068e8e
                                            • Instruction ID: 32ee7337f1c3b6cbfc6723004d0862295a97790d389f0f5cd7ea0bf21459808b
                                            • Opcode Fuzzy Hash: e7d90d203c73457a7cf27df93987b7c96341d0a9a4654e524ce14b9f38068e8e
                                            • Instruction Fuzzy Hash: 0B210A74E05209DFCB14CFA9D0466AEFBB6FF48300F1885A5D415A7240DB74AD81CF90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 71cd2d54582f96634bd082007e7d12bf52719f4a15af976202e6f74a007a91c7
                                            • Instruction ID: bb9647f0638d88e515c36e3dc1cbe6f9d8b6ecd139b22422524a5606ae45461b
                                            • Opcode Fuzzy Hash: 71cd2d54582f96634bd082007e7d12bf52719f4a15af976202e6f74a007a91c7
                                            • Instruction Fuzzy Hash: 8021A774B00A09CFDB45EF68D5949EEBBB5FF89300F10456AD505A7320EB709A46CFA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cf0542ff22a79319930f9258e097f074775c7708bf0dd76e15bf54468b913720
                                            • Instruction ID: aa67779a63b028e587ceebf8ebe4151e55dd8b1fa4c909619c57c62fc76f0992
                                            • Opcode Fuzzy Hash: cf0542ff22a79319930f9258e097f074775c7708bf0dd76e15bf54468b913720
                                            • Instruction Fuzzy Hash: 39215CB4D00149CFDB05CFA8C5047EEBBB2FF88300F28446AD115B3251DBB45A84CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a7f3658717b7f6946f114a07ea072261dbc8e200f6496a9e7b6221cde4e313af
                                            • Instruction ID: 2032ec2f21117e42d3258c9da6e968035e89f11868626f6e49a75a9e1953ecc8
                                            • Opcode Fuzzy Hash: a7f3658717b7f6946f114a07ea072261dbc8e200f6496a9e7b6221cde4e313af
                                            • Instruction Fuzzy Hash: 8731C774A452A8CFDBA5CF28C984B9ABBF5FB48304F5088D5D409A7351DBB1AE81CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 07e94aeb55d90e83b448e51480557df6bfd0c6e5898a116e745ff3bbd5568c96
                                            • Instruction ID: ef0920f4df5db7bbb3ababd8eaa8429be9da2aca684655a004933c9efde1f551
                                            • Opcode Fuzzy Hash: 07e94aeb55d90e83b448e51480557df6bfd0c6e5898a116e745ff3bbd5568c96
                                            • Instruction Fuzzy Hash: 1031E778A01158CFDB64CF59D9947DEBBB6FB88305F1080AAD60AA7384CB749E81CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aee1c8b6b91c49da2cc048e1f8f06a60b9e2d78f9007e653e9aaacff854eb7b9
                                            • Instruction ID: d98ceaa0ab5be413d5089f9b1ef6b9f4414e909cc399ff469cd97101ba592ebe
                                            • Opcode Fuzzy Hash: aee1c8b6b91c49da2cc048e1f8f06a60b9e2d78f9007e653e9aaacff854eb7b9
                                            • Instruction Fuzzy Hash: D5214A74E04209DFDF04CFAAD8497EEBBB6EB89300F108469D404A3350DBB49A81CFA5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ac50b35859dc7bee96c980598237ee67cbad3a7069f61d9c0694ee565a8ecbb8
                                            • Instruction ID: 54866a8be89bfb5970a59a6bb3797aa6d0a9aa13880d3adf52648735d8c74cb3
                                            • Opcode Fuzzy Hash: ac50b35859dc7bee96c980598237ee67cbad3a7069f61d9c0694ee565a8ecbb8
                                            • Instruction Fuzzy Hash: 1A219DB4E0020A9FCB04DBB8D8945AEBFF6EFC5200B0085A9D901E7355DB759E06CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128145340.0000000002F4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F4D000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_2f4d000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: db2a639e1f1c31ddd911f887a088d995e6db761895763967168c77259773394f
                                            • Instruction ID: ad6a90a16056f5bf5d7cf062003fb16a72dff42d594c1ccda2decf410cb00f87
                                            • Opcode Fuzzy Hash: db2a639e1f1c31ddd911f887a088d995e6db761895763967168c77259773394f
                                            • Instruction Fuzzy Hash: E721C2754093C08FCB02CF24D994715BF71EB86614F2881EAD9458B667C33AD80ACB62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 06d1906863233d5f136ae3cd6747e07960fed5f541b42fa32f77e5c7414090d4
                                            • Instruction ID: 23de8209689a149fcf0aae570f6a9c6171b870cbdfcd372a67fd02bfc18ef1d2
                                            • Opcode Fuzzy Hash: 06d1906863233d5f136ae3cd6747e07960fed5f541b42fa32f77e5c7414090d4
                                            • Instruction Fuzzy Hash: F5211A74E04209DFDF04CFAAD8486EEBBB6EB89300F109465D419A3250DBB45E85CF95
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a5e1760cb040028ac4f3f61a3d93f0b1d016aa98e416d62b5996c970f470a143
                                            • Instruction ID: 9aa5d6449febc2cd49b24eca9ab8b178160c42963300bfbc79019e8bc96c54e1
                                            • Opcode Fuzzy Hash: a5e1760cb040028ac4f3f61a3d93f0b1d016aa98e416d62b5996c970f470a143
                                            • Instruction Fuzzy Hash: A011D3B6C0D358DFD701CBA0C9463ADBBB0EF56205F4A65EAC489C7285E6758E01C751
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3366d28782ee2a8c590aba435936d18ea6915b8f8c8964ed3909f4b6fe691637
                                            • Instruction ID: 0b46e9e31879f513f9a4ecdc613f6556044af4f0caf7824e4c65223ba2b968af
                                            • Opcode Fuzzy Hash: 3366d28782ee2a8c590aba435936d18ea6915b8f8c8964ed3909f4b6fe691637
                                            • Instruction Fuzzy Hash: 0931C274A50328CFDBA4DF68E89479ABBB1FB49745F4040EAD419A3280DA749FC4CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 00eb359cb18e3edf475b6621d46cbc18022110b2adc1e8531f2d8b5a09806484
                                            • Instruction ID: 9287b1dc19ea9eedaca352a5ab8d939fcc71948cb2717a77a1aad83aa416ab25
                                            • Opcode Fuzzy Hash: 00eb359cb18e3edf475b6621d46cbc18022110b2adc1e8531f2d8b5a09806484
                                            • Instruction Fuzzy Hash: 8111B675B442009FDB20DBB888597BE7FF2AB88601F244129E999D7380DB70CD01CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 487f2be648a24c4286d5c44e133d7606515bca54ff6e7b47ec2f1035b57ea083
                                            • Instruction ID: 42f7858c2f54f2430d1d4ecc6219de366c42680de8eb672fb22d80bcf58c1fdc
                                            • Opcode Fuzzy Hash: 487f2be648a24c4286d5c44e133d7606515bca54ff6e7b47ec2f1035b57ea083
                                            • Instruction Fuzzy Hash: A7215E70A04209CFD714DF65E9547AEBBF6FB89314F109068C54AAB388DA305D81CF18
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a93f216a1e90d1c2f4c871abf5747b480a34471f051cf1b4d3d87be10bdfab49
                                            • Instruction ID: 4b3da72084c0468bddc992ba7b1c54064cb747817aa6ad61c9a9f8e28fb3272a
                                            • Opcode Fuzzy Hash: a93f216a1e90d1c2f4c871abf5747b480a34471f051cf1b4d3d87be10bdfab49
                                            • Instruction Fuzzy Hash: 6B1123B0E0621ECBDB04DF9AC8446EEFBF6BF88300F05842AD515B3250DB715A44CBA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f555c535dda5c247c8c75bb73b42e6163cccb8426d082acea154bbf4008921b9
                                            • Instruction ID: 972f42f66dc3dbdb819647933ccf2234475bc80f5277ccafea263ac98029ddf4
                                            • Opcode Fuzzy Hash: f555c535dda5c247c8c75bb73b42e6163cccb8426d082acea154bbf4008921b9
                                            • Instruction Fuzzy Hash: E6215834A0410E8BDB44DFA9E4456AFBBF2FB88314F108129D615A7384DB70AE418FA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8d40d09850a90e5e6f45c21fa6895275bc0cd6f677dce6443f0c9259cdbf8491
                                            • Instruction ID: 04aa596e0d1d5ca1fe3acb0e0e322c5cd28040e4c01a9832b4d34a8d4e7f38f9
                                            • Opcode Fuzzy Hash: 8d40d09850a90e5e6f45c21fa6895275bc0cd6f677dce6443f0c9259cdbf8491
                                            • Instruction Fuzzy Hash: 4F1107B4E002099FDB44DFB9C8417EEBBF1FF88210F1084AAC518A7344EB719A418B91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4879439e94fd46bfd6e7fa50664a8de485915d01c9390c10931bcdd087ee5c3d
                                            • Instruction ID: 657d36f19d2b84b8534036d6c3cf94f4f8b1f7cf492c29700528bc94f76ae9e5
                                            • Opcode Fuzzy Hash: 4879439e94fd46bfd6e7fa50664a8de485915d01c9390c10931bcdd087ee5c3d
                                            • Instruction Fuzzy Hash: 8F016D313101004FD714AE6AE8D8ABAB7ABEFE4660B14857AE507CB325DFB5CC01C790
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 161fbef0bcf2bc69e93d9466be83d756a6ca6ad3a0263fa59d115074d01f6f83
                                            • Instruction ID: 93e41695eb720149157cb852b67777052c4ca022768feb38287b33fb89c88ae3
                                            • Opcode Fuzzy Hash: 161fbef0bcf2bc69e93d9466be83d756a6ca6ad3a0263fa59d115074d01f6f83
                                            • Instruction Fuzzy Hash: 9D114CB8E0020ADFCB04DFB9D8448AEBBF6EF84201B408569D615E7354DF75AE45CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f0f0f59666ee2bedc91bb8925ea0b5af2816bda2779f4f4be6695fb82f484d5
                                            • Instruction ID: 7945296577f6387944018d4df1f4bebb6771a698df7bd704fbf9adc3faba449b
                                            • Opcode Fuzzy Hash: 3f0f0f59666ee2bedc91bb8925ea0b5af2816bda2779f4f4be6695fb82f484d5
                                            • Instruction Fuzzy Hash: 61118238B10A05CFDB01EB64D4946EDB3B6FF89701F5045AAD5029B320EB74AD46CBA1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 488d299c7bca50dc4551ddaf0d441db68d1f0777c25d4bfd185cce9c93c5a7f2
                                            • Instruction ID: a713c03756b9d1831e4af8e8ff408bce7b24dbbcd6141fe651ac55a05c3ffe0f
                                            • Opcode Fuzzy Hash: 488d299c7bca50dc4551ddaf0d441db68d1f0777c25d4bfd185cce9c93c5a7f2
                                            • Instruction Fuzzy Hash: 14219278A42619DFDB04CFA8D594EADBBF2BF49704F205154E906EB361CB30AD41CB50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: db6c52b8cf93a74adf245d714673dafadb7b37efd65f5c45a575ae2e2bffdc14
                                            • Instruction ID: 952defb9ca8108d46bead4921b1f40fe99f854ba0e567100a718daeed1fbfa38
                                            • Opcode Fuzzy Hash: db6c52b8cf93a74adf245d714673dafadb7b37efd65f5c45a575ae2e2bffdc14
                                            • Instruction Fuzzy Hash: 9A014436350355AFDB108E59DC85FAF7BAAFB89B21F108066FA15CB290CAB1DC108790
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6201a7e5a0852b2358cb4bfbb62ce1f100eb45ae7038f1a8c387e502ea6d7325
                                            • Instruction ID: ea93c92fd43232e6ab20bf2d7dc10716036bbe2f4d2b2a46774f998d2dc8269c
                                            • Opcode Fuzzy Hash: 6201a7e5a0852b2358cb4bfbb62ce1f100eb45ae7038f1a8c387e502ea6d7325
                                            • Instruction Fuzzy Hash: D7113938A41208CFEB88DFA8E559BAEB7F5EF48750F140465E502EB3A0DF759945CB01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8d0f66d2d6e904d7a2b15a87db1a775c6c7eec294b04a3e69a6dca7007ec4590
                                            • Instruction ID: 07c551a83ed8c563da8221817cdb0aa0ad99b835d38f4bf0176afebb1e16eea2
                                            • Opcode Fuzzy Hash: 8d0f66d2d6e904d7a2b15a87db1a775c6c7eec294b04a3e69a6dca7007ec4590
                                            • Instruction Fuzzy Hash: FD112736E002199BCB04DFA8E4046EEBBF5FB88315F00406ADA1AA3240D7755A85CBA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4d5cd7d0e1a28840e8eae64a5d79c4fb1db30bd54dfc85a916ebbf9c54d5b09e
                                            • Instruction ID: c4409b07dc6c31c81d14e4b7b4a40e0366e757a66fcbc92eea6e92ed997c5f33
                                            • Opcode Fuzzy Hash: 4d5cd7d0e1a28840e8eae64a5d79c4fb1db30bd54dfc85a916ebbf9c54d5b09e
                                            • Instruction Fuzzy Hash: 6821E3B4A44318CFDB54DF58E8557E9BBB2FB88314F1080A9D609A7284CA748E81CF58
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5e37c42a787a74b55ab827d911e53672ef1c2ec0479355a57fc02e4f431c41ca
                                            • Instruction ID: ac231e41c822a5055b4ed511bc6d183f216927fe0a4d9eb9c5d9721b48d46c17
                                            • Opcode Fuzzy Hash: 5e37c42a787a74b55ab827d911e53672ef1c2ec0479355a57fc02e4f431c41ca
                                            • Instruction Fuzzy Hash: 6901F7357052189FD388DA5D9844B2EB7EBEBC9370F10086AE50AD7394EE709C018755
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35dc9644ca16bcf23bad3702e86130e22a2062afa8c7535f13948c0a6a2c8677
                                            • Instruction ID: b521f604123a5b9352c6b75b8623fc4fa36cd11f4c4bc9f47b48506db2f199ec
                                            • Opcode Fuzzy Hash: 35dc9644ca16bcf23bad3702e86130e22a2062afa8c7535f13948c0a6a2c8677
                                            • Instruction Fuzzy Hash: 8B01DF357006449FD310A7A8D418B2DBBE2AFC5764F1880A5E509CB391EAB4DC028B90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fd3cb937e97479cd28374580ad490450507d7db066c5f947921428b5cd15abc6
                                            • Instruction ID: a6dbf9f9f547618b5b0d18fb0640d9597ac6167447633082652f5ca39343937c
                                            • Opcode Fuzzy Hash: fd3cb937e97479cd28374580ad490450507d7db066c5f947921428b5cd15abc6
                                            • Instruction Fuzzy Hash: 96019234B092089FD794DB688484B7EBBF7EF89260F144899E90AD7396DE748C018751
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 675074371351a12dd9c4bccb33d34d53a5d210216901044c60cc58080a57a54a
                                            • Instruction ID: 20d5d961c16374147674e08ae2e961d5b415ce57dfcbbd33f384c83608374543
                                            • Opcode Fuzzy Hash: 675074371351a12dd9c4bccb33d34d53a5d210216901044c60cc58080a57a54a
                                            • Instruction Fuzzy Hash: B1117C30701206CFDB44DB29D454B6A3BE2EF85304F2485A9D40ADF6A2DF7ADC46CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a53789da7e00d81f67dd12cc26bd3bc8eb7d5f9a047cdd8e3295ae49b13c8e97
                                            • Instruction ID: 0131e5da5f7d44f43fd1bc9fde275306ca03d37fe8843ce0a1422873ab3c6b8d
                                            • Opcode Fuzzy Hash: a53789da7e00d81f67dd12cc26bd3bc8eb7d5f9a047cdd8e3295ae49b13c8e97
                                            • Instruction Fuzzy Hash: E601AD353002009BE7259A24C894BBA77A7EBC9320F14496CE6A24B390CFF1EC42D780
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2e11dcaecf381a3b58d20513f83e8b02bc8b4533e9490bcf751b00cef2394bc4
                                            • Instruction ID: c095ff1fab69aaf2e82e0b39b80ed04a4cd499a24327ca9ab2a918f493055515
                                            • Opcode Fuzzy Hash: 2e11dcaecf381a3b58d20513f83e8b02bc8b4533e9490bcf751b00cef2394bc4
                                            • Instruction Fuzzy Hash: B7117975E042499FCB00DFA8E8446EEBBF6FB88315F00406AD956A3380DB755E45CBA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fed2eacedcc2ecef9224bb940e53373f8bac0c476703de7197d2f8e7529b711d
                                            • Instruction ID: f40c49989eb277aa3928b7af859e205332b6e74b795761ece561853d1a88d4dd
                                            • Opcode Fuzzy Hash: fed2eacedcc2ecef9224bb940e53373f8bac0c476703de7197d2f8e7529b711d
                                            • Instruction Fuzzy Hash: 9411FE74E09208CFDB28DFA5D944A9DBBB2FF84304F24816AC419A7395DB745D42CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c6da638a11a35150345bd0024a32dda1866069adfabaa2bd473b60aec8339174
                                            • Instruction ID: fc94e2d3925aabd97ff393c25e69988defea989aa24d1ac0ef9c83ac2afa0c3b
                                            • Opcode Fuzzy Hash: c6da638a11a35150345bd0024a32dda1866069adfabaa2bd473b60aec8339174
                                            • Instruction Fuzzy Hash: 7301B5717002149FDB14DB68D894FEEBBF6EBC8300F1044A9E109A7351DE71AD88CB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b8760c0fb953d5d4b3476ab628611139b40dccaf01eaefaead6f67df4cfc3f4c
                                            • Instruction ID: 26e573d4ee4872b851ecda024d7c79ee902b42fc26cd9d9a8a831d3467b20f6e
                                            • Opcode Fuzzy Hash: b8760c0fb953d5d4b3476ab628611139b40dccaf01eaefaead6f67df4cfc3f4c
                                            • Instruction Fuzzy Hash: 0D014BB6E452099BDB04DFB4C845BAFBBF5EB48200F1189A9D518A7740EA71A9009B90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6fe4e59981614de80810891e9594586748eb4dc5474dc6c4e1cae9163ca756c3
                                            • Instruction ID: c60fb86a15e3b72f4eff90ae620e66bdef5b47af238f325672e720a1b32195b8
                                            • Opcode Fuzzy Hash: 6fe4e59981614de80810891e9594586748eb4dc5474dc6c4e1cae9163ca756c3
                                            • Instruction Fuzzy Hash: 5B0117B5D09249CFDB54CFB984426AEBFF2BB49340F1885AAC408E3241DB705E81CB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b28c2b5466f34b1b894eb809b35e30b5b1e4559ca04aa0b0b06f28ef0f1dbb28
                                            • Instruction ID: 1325e79b80ed38b1bb493154da37356af86a18c42fd4669a6e2b3e8d66064485
                                            • Opcode Fuzzy Hash: b28c2b5466f34b1b894eb809b35e30b5b1e4559ca04aa0b0b06f28ef0f1dbb28
                                            • Instruction Fuzzy Hash: 04116D70A08318CBDB14DF65EC547EEBBF6EB9A301F1091A9E94DA3240DB705A85CF49
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 31cb642e2a65e9b621fe13abb1851d55f8cb451381897138ff36933ec1cc1206
                                            • Instruction ID: 484fd579f5eef073744ee06467749f4e7d9b204c708da036d95acea4faefd792
                                            • Opcode Fuzzy Hash: 31cb642e2a65e9b621fe13abb1851d55f8cb451381897138ff36933ec1cc1206
                                            • Instruction Fuzzy Hash: 29111E70E44249CFDB54DFA5D850BADBBF6FF85310F109069C44AAB258DB705981CF19
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 72d78256e12ce66c8541e6e49f672cca54f6580ffcb9932b4edbbe78892c950a
                                            • Instruction ID: 04f321e2851c702929a891a9b6e7460a067c0629c2587795ab99b73dcf91ff3a
                                            • Opcode Fuzzy Hash: 72d78256e12ce66c8541e6e49f672cca54f6580ffcb9932b4edbbe78892c950a
                                            • Instruction Fuzzy Hash: 39015E353002049FE725AA24C454ABB77A7EBC9324F144A2CD6564B790CFB5EC42D780
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5702092d795dd0655d1fe6ee9a2b5c6dc12da0e22d0e66f7f44b3f7324120f2d
                                            • Instruction ID: 1470688a8b946a49a7f31657cd9a69f9e1d9a551c91a5fc99ce9b577484e8b79
                                            • Opcode Fuzzy Hash: 5702092d795dd0655d1fe6ee9a2b5c6dc12da0e22d0e66f7f44b3f7324120f2d
                                            • Instruction Fuzzy Hash: 750128363006209BC7099BA4E459AAABBE3FBCC711F104568FA0A87750DF75EC42CBD1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aead4c96ee7acc7699b28c0f25a16f5444bea16d5be85e06309f80f24424f141
                                            • Instruction ID: 4f9f01c9913f6d6488d4891387871ae923b40b85aac9b033f6efbc99ad67748c
                                            • Opcode Fuzzy Hash: aead4c96ee7acc7699b28c0f25a16f5444bea16d5be85e06309f80f24424f141
                                            • Instruction Fuzzy Hash: 02F02B773041108BD724529DE849F7E77DEEBC5365B045527F946CB354DE64CC05C2A8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4784f54396ce9ede8831a0209f96a9ecc05fe5b1db90cbb059912bd44fd78d07
                                            • Instruction ID: ef07635520738d3f806bcccb32f1c4edded427139d6fb49ceff5e0d6692d315f
                                            • Opcode Fuzzy Hash: 4784f54396ce9ede8831a0209f96a9ecc05fe5b1db90cbb059912bd44fd78d07
                                            • Instruction Fuzzy Hash: 6411B074A402298FCBA8CF58D994AAABBF1BF49345F6080D59419A7254DA30AEC88F50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ae92e9b944b2f528173452b1d9a46d46687b44b854908fd9af19733f34261fd1
                                            • Instruction ID: 342209556acca7ee5653da65082e6748fd6323e9d2f8858b4fb7664aaaac0189
                                            • Opcode Fuzzy Hash: ae92e9b944b2f528173452b1d9a46d46687b44b854908fd9af19733f34261fd1
                                            • Instruction Fuzzy Hash: 27F02B327101146BDB189A59E8449FAF7AAEFC8360F008026F915DB321EF719C17C7D1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 37cccc0c38e6ebf4c1ac75b2b4798a82325de073595d6faa27312ebfc681dfd4
                                            • Instruction ID: 8b46a6268ed2eb95fbe9788a706ec8f0ac23bcb0cb56ad3b0170b5280b36e23a
                                            • Opcode Fuzzy Hash: 37cccc0c38e6ebf4c1ac75b2b4798a82325de073595d6faa27312ebfc681dfd4
                                            • Instruction Fuzzy Hash: E10102B4E042499FDB80DFA8E5452AEBFF1FB59304F208669D559E3344DBB48A808F91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f42113993d844102469c0546e1a79ec9b099122a35c355a52dcbbc1244b6bd44
                                            • Instruction ID: dc53c733c6df78a7799d1ed4ec1ea3cc0717b94d694c54cf9fbc2a19cde71c59
                                            • Opcode Fuzzy Hash: f42113993d844102469c0546e1a79ec9b099122a35c355a52dcbbc1244b6bd44
                                            • Instruction Fuzzy Hash: EA0119393006249BC7099B64D458A6ABBE7EFCCB11B108569EA0A8B750CF75EC42CBD5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 495a7a5de4e5958542ce0418b486c0aafc83297437d6dbc95f76c6a68f714b1c
                                            • Instruction ID: 298e74b16b088560502f9bd59f2b2dbe66363016a219bce3c257603f1f1239df
                                            • Opcode Fuzzy Hash: 495a7a5de4e5958542ce0418b486c0aafc83297437d6dbc95f76c6a68f714b1c
                                            • Instruction Fuzzy Hash: 30F0FC31B082115FE315876C9C0472BBB9AFBCD320F04456DE9899B391DB729C41C7D4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: af2e999084ed063e52071625810ea408d3fb1e2d464315630e42af3d85e05bcd
                                            • Instruction ID: 287869e3335d7060cd3ffece69d8a5d8a66a40dd5dc49b3f244953ba4127735d
                                            • Opcode Fuzzy Hash: af2e999084ed063e52071625810ea408d3fb1e2d464315630e42af3d85e05bcd
                                            • Instruction Fuzzy Hash: 74018174A0020DEFDB10EFB4E9557BD7BB6EB88314F109599D808E7304EA714F459B81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dda090343547994d2a9a9ffbe8643200d58da424fd47a8877b91de3e16face4a
                                            • Instruction ID: 46c17ee2efcf09a7d00de3d8275c361c1d4f3ae44ee700138aa7a0f21da5e8fd
                                            • Opcode Fuzzy Hash: dda090343547994d2a9a9ffbe8643200d58da424fd47a8877b91de3e16face4a
                                            • Instruction Fuzzy Hash: AE015E7490A258CFD711DF69CC486E9BBF1FF49700F2842E9D00997212D730A948CF00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6a9d8736062a6ee53dfa6b1bc99d34924708aa73a06800640fda140ffbe2a91a
                                            • Instruction ID: 527a7e06c8a02ad3a901b387157e3d0c97f73dcc64a793d1b1a307875ebce8f0
                                            • Opcode Fuzzy Hash: 6a9d8736062a6ee53dfa6b1bc99d34924708aa73a06800640fda140ffbe2a91a
                                            • Instruction Fuzzy Hash: B6F0CD3220030597D714DF55DC85F97BFAAEFC0320F008A2EF51547651DEB0AD05C6A0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 202d114d50ce9d7c3747e402cd9a1e04ad73021ab5868ca03d22e2d0ce19b485
                                            • Instruction ID: 1c4b158bc5f0ec4b005a1b3e9f96eb424ca342fc1bf76b739a0eb042117e7017
                                            • Opcode Fuzzy Hash: 202d114d50ce9d7c3747e402cd9a1e04ad73021ab5868ca03d22e2d0ce19b485
                                            • Instruction Fuzzy Hash: 83F02B72B0D2919FE31607385C513397FA7EB85308F1814DAD5C28F391DE569802C344
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a59c2aa5f81ca4f55fbdf84f1f8853f2fa5f8c5cef3b9aa54d55c390d9dee95e
                                            • Instruction ID: c7c965c9528b48a00b8801fe590de7c8a55a27fc4e5d10caa38b1cb217f70632
                                            • Opcode Fuzzy Hash: a59c2aa5f81ca4f55fbdf84f1f8853f2fa5f8c5cef3b9aa54d55c390d9dee95e
                                            • Instruction Fuzzy Hash: C8F062353102109FC714DB65D844F7A77B6EF88721F144069F945CB3A0DAB1EC42CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 91c809b13ae901965b31e43a67939b0a5bff85e55bdcce766aa4222e7c9b6bea
                                            • Instruction ID: 3d80aa37ee3b0cbd5a44ae9aeea65139ef86389cb7328ae43964de6e19efaafe
                                            • Opcode Fuzzy Hash: 91c809b13ae901965b31e43a67939b0a5bff85e55bdcce766aa4222e7c9b6bea
                                            • Instruction Fuzzy Hash: 52F0B431B082155FE31487199804B2BBBAEEBC8720F144429E94A9B350DF72EC4187C8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35338a7290fecf20ea677887f0de3e7ade5063cfc50d2e0e078d82d74304b849
                                            • Instruction ID: c5acc95f3cbe947f7efac61cc477fb4e25997413a58b49fed486f70e0c14f868
                                            • Opcode Fuzzy Hash: 35338a7290fecf20ea677887f0de3e7ade5063cfc50d2e0e078d82d74304b849
                                            • Instruction Fuzzy Hash: D00108B4E0420DDFDB80DFA8E5456AEBBF1FB58304F208169D919E7344DBB49A408F91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2c68f924710792679900b789c983a36cac17ba16664ccc3ac19261436ceed173
                                            • Instruction ID: 3c777cd1ce20815f006d1c6170a62a6eb30f63eb9b4592f753f7299622b9bedc
                                            • Opcode Fuzzy Hash: 2c68f924710792679900b789c983a36cac17ba16664ccc3ac19261436ceed173
                                            • Instruction Fuzzy Hash: 09015774A01118CFCB14DF68D85879ABBB1FB89304F0081D5D40AA7380CB308E82CF80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 80d3ba2c624099b64b7b99e2422e67855e691c90aaafbbe7f842fd159d2f4bca
                                            • Instruction ID: 747f175ec48935b54184f862c8b61c9f0ba1250ddb8297c81c336fad99695cc7
                                            • Opcode Fuzzy Hash: 80d3ba2c624099b64b7b99e2422e67855e691c90aaafbbe7f842fd159d2f4bca
                                            • Instruction Fuzzy Hash: 46010878A05118CFDB54DF68D854BAABBB2EB89304F108199D50EA7384CF709E82CF84
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 494668b7ad996340499429a851c833cb9813ef4cb97a7a208e067272fc1c73ce
                                            • Instruction ID: a53782823476c754545e077242cfec635cc467d6a4b93c9c43f29f93f7dad011
                                            • Opcode Fuzzy Hash: 494668b7ad996340499429a851c833cb9813ef4cb97a7a208e067272fc1c73ce
                                            • Instruction Fuzzy Hash: D3119378A402288FCB64DFA9D9545DABBF2FB88740F5041DAEA09A3354DA749FC48F50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 274ad8384619f3aa89fcc898da14b2e9ca58377f78615ccbb644dae7bb8ef18a
                                            • Instruction ID: c4579bf42ceb7bd5416558622217473bb71351554ea7bac3f593075e30b129e9
                                            • Opcode Fuzzy Hash: 274ad8384619f3aa89fcc898da14b2e9ca58377f78615ccbb644dae7bb8ef18a
                                            • Instruction Fuzzy Hash: 33F05E353403459FE7049FA9D898D6B77B9FFC9720720846AF915C7360CA71ED048A90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 648bb8dd55e1ce9f99c3107aad7f24d67fa47056cf2b36d85a6cba70e786904c
                                            • Instruction ID: 681864fa7fe8fbec1d418792a3ef54e4c9e3c04a891ec5f522ba630c4d0ddf33
                                            • Opcode Fuzzy Hash: 648bb8dd55e1ce9f99c3107aad7f24d67fa47056cf2b36d85a6cba70e786904c
                                            • Instruction Fuzzy Hash: E5018C349093598FC765EF29D85579ABBB2FB48320F0041E9D50EA3395DB304E84CF45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7bef6ba412cb429528d66fc8b6f742bfad17409d6341feaff324238d0454f134
                                            • Instruction ID: 58b02fc7c779593a916e7d5b93bb1ede214bc5c60827dcaa3edba90912575eea
                                            • Opcode Fuzzy Hash: 7bef6ba412cb429528d66fc8b6f742bfad17409d6341feaff324238d0454f134
                                            • Instruction Fuzzy Hash: D3E0D86270907147EB24145DACD1BBB94AAEBC662DFC40C3AAC46D3344D8508C0383E1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bd06f68b75c6ecb1bd4ce3f8c741b72180a2e04996c5a9d91cc9b4726c56353d
                                            • Instruction ID: 2ae8b037a5e43cdef0f11b135d43b064be8b65de9b24fd7b57d1a18528d2c0b3
                                            • Opcode Fuzzy Hash: bd06f68b75c6ecb1bd4ce3f8c741b72180a2e04996c5a9d91cc9b4726c56353d
                                            • Instruction Fuzzy Hash: 23F054353102009FC714DB55D854E3A77A6EFC8711B148069F9068B3A0CA71EC01DB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cdc3c2a047e73644523eed20690bc17b3efd1aa608fa5d32a59aa65209c19030
                                            • Instruction ID: 2fe5d57358936b856052f95388c7ae341c063e7daa4c901d0bbd8fbc5303b8af
                                            • Opcode Fuzzy Hash: cdc3c2a047e73644523eed20690bc17b3efd1aa608fa5d32a59aa65209c19030
                                            • Instruction Fuzzy Hash: 71014278908358CFCB65CF29D880BA9BBB2EB59350F1002D8D88DA3351DB309E85CF06
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 628f74c66d231be53e632a7000165adbb4212a7b99d49922f9243ce7adea8447
                                            • Instruction ID: 5ff4fbceb017ce0af1475e3e7d68b37967585460153b97936ad33b6ddac9c328
                                            • Opcode Fuzzy Hash: 628f74c66d231be53e632a7000165adbb4212a7b99d49922f9243ce7adea8447
                                            • Instruction Fuzzy Hash: 19011A74A44218CBD764DF25E8507AEBBB2FB48314F1040A8D51DA3354DB744EC4CF45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5f32f0a05a9e3cc213a262ec534e6f2c5562d7aa27b4acbdfd6044edbe5686e1
                                            • Instruction ID: be70dd9fa796568596a0cc64294fdd2165f5732177a9a9de4a5c6251d949140f
                                            • Opcode Fuzzy Hash: 5f32f0a05a9e3cc213a262ec534e6f2c5562d7aa27b4acbdfd6044edbe5686e1
                                            • Instruction Fuzzy Hash: E4F05E75948248EFCB44DFA8C845BADBBF9EB48200F14C89AE899D3341D2359A51DB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0cd8bea33e3cd4fcaf73d668f2277505dc0b8c02b2992763caa74eb6b35313bb
                                            • Instruction ID: 0bac921b0f15b99e66d709194ed102a1c4f7e2cd8045075f5e09a0e8ed0b837d
                                            • Opcode Fuzzy Hash: 0cd8bea33e3cd4fcaf73d668f2277505dc0b8c02b2992763caa74eb6b35313bb
                                            • Instruction Fuzzy Hash: 3C0181748092889FCB12CB68D895B9D7FF2FF06324F4842E9E05597192C7746D8ACF15
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 53d14c466aad56f4e1b27726b1b490a6b998018da7b6e29845698e2d2af0fe90
                                            • Instruction ID: 70e64f9ee8975e315aaaca0a365b31574c73fed4fedb2d234c07ff2deee7ac05
                                            • Opcode Fuzzy Hash: 53d14c466aad56f4e1b27726b1b490a6b998018da7b6e29845698e2d2af0fe90
                                            • Instruction Fuzzy Hash: 2E011970A59208CFDB04CF59E881B99BBF2FB58355F6090A5E889D7244DB348D81CF09
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 668bb82c482b39af4cb5ac3c4c5cb328890e6d59ea3fdca5bd7d7789b7fd8ee9
                                            • Instruction ID: a2a9e5408cd2f4296b7337dffe3ce96104c55db65b0589cd1ecec3cdfb7a9fc1
                                            • Opcode Fuzzy Hash: 668bb82c482b39af4cb5ac3c4c5cb328890e6d59ea3fdca5bd7d7789b7fd8ee9
                                            • Instruction Fuzzy Hash: 26F0BE30904604AFEB09CBA8D88D39C7FB3EB44261F148098E04A93290DF704681CBC0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 24985c585d4cb3095deb6b8a62617a6072e0c98f2b38a1528253507733a47abc
                                            • Instruction ID: 5567b58da1b98dcb7cb1ae585b3356814f83d6342fbd8281c2abfe91b6c4cdaf
                                            • Opcode Fuzzy Hash: 24985c585d4cb3095deb6b8a62617a6072e0c98f2b38a1528253507733a47abc
                                            • Instruction Fuzzy Hash: 32011274A44208CFDB20CF69E884BEDBBB2BB59305F2080A9D848A7340CB709E81CF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dd876d08ee1d149a94f81e19c5bd6bdd3d69ab1545f9d477abb0b4a9279f3175
                                            • Instruction ID: ff26f72fdab1a40c0c8a329330713e684d6b0085389ce42a015dfe43018e3717
                                            • Opcode Fuzzy Hash: dd876d08ee1d149a94f81e19c5bd6bdd3d69ab1545f9d477abb0b4a9279f3175
                                            • Instruction Fuzzy Hash: 99F01C75D04208AFDB54DFA8D9467ADFBF4EB48300F10C4AAD859E3342D7729A51DB41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 41ea75f98b968c4a63db6e2de40d1cb32f0f4ccdb3bbe858c4eee1f0d59736c6
                                            • Instruction ID: 266c50f8ef12515cb2577ea6647ea07309992ecf39f7c2f4afce6d7a49e9d21b
                                            • Opcode Fuzzy Hash: 41ea75f98b968c4a63db6e2de40d1cb32f0f4ccdb3bbe858c4eee1f0d59736c6
                                            • Instruction Fuzzy Hash: EBF0F475D09248EFCB51CFA4C945A9DBBB1EF58300F04C0AAEC4993251D2769A61EF91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5ebe6ec82efee78eff9294473879b9503de443f7995e2346d270810201d7d8c6
                                            • Instruction ID: 6b4de2170770a1ce7e73a20997ed404e1cd207471b9beb0a25d1fbe038c16262
                                            • Opcode Fuzzy Hash: 5ebe6ec82efee78eff9294473879b9503de443f7995e2346d270810201d7d8c6
                                            • Instruction Fuzzy Hash: 86F017B0D04288EFCB81CFA8D584BADBBF5FB48300F14C59AA86897241D7759A50DF10
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3629def886d85d04103cac0cfa486270f978987513ff13bcc33b5abfd647052f
                                            • Instruction ID: 7977724d03b51715b5bc17d9b6a05a2980ce6b46ad4f5c6b63fc988e71c2cfd3
                                            • Opcode Fuzzy Hash: 3629def886d85d04103cac0cfa486270f978987513ff13bcc33b5abfd647052f
                                            • Instruction Fuzzy Hash: B9F08C7590524CEFCB00CF84CA00BADBBB1FB58350F14C5A9DD2853352D3729A52EB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 77703c75ff3a6e26a37ab689c8e0fb74a2d2e18ffb9752dce66a61603a67a488
                                            • Instruction ID: 362d1a7c8bf706c4dc4e20908c274f7f644f5f5cd25a73b3c85cdd2b1e6091d0
                                            • Opcode Fuzzy Hash: 77703c75ff3a6e26a37ab689c8e0fb74a2d2e18ffb9752dce66a61603a67a488
                                            • Instruction Fuzzy Hash: BCE06C3220030657C7145659EC45B5BBF96DBC0265F04953DA11987611DDF49D4586D0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 482bb24c27dbdc9762a28982fe4346fe876edc3ee9ff0264d711b197e979dc3c
                                            • Instruction ID: 291e52af58bd63d3e53ed3524df838c7b03fd36e438d3e4695d7330d0c7d5f4a
                                            • Opcode Fuzzy Hash: 482bb24c27dbdc9762a28982fe4346fe876edc3ee9ff0264d711b197e979dc3c
                                            • Instruction Fuzzy Hash: DFF09035904349EFDF01CF94C900A9DBBB1FB09310F148295EC6857392E3329A12EB10
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: be8e76e94e25381dd9eba6dafd21f2e6fe00bbff2e9bb6575956ce2823c3fe8d
                                            • Instruction ID: 95260e07423de1ef28ca608c0754196831ce0adc45686cf7e9ca59b9ba8ed1e8
                                            • Opcode Fuzzy Hash: be8e76e94e25381dd9eba6dafd21f2e6fe00bbff2e9bb6575956ce2823c3fe8d
                                            • Instruction Fuzzy Hash: A3F01974A45208CFDB04DF59E890B9DBBF2FF99351F6090A9E44993244DB345E81CF15
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a19ff40a97cde251b967b96751a20de2eabb8d70c8deb3a538531eedc4c16bdf
                                            • Instruction ID: b7af8ef36a67c3e5489c4488455af5db0117b3f0d7a3d8ec8b2295cfb1187088
                                            • Opcode Fuzzy Hash: a19ff40a97cde251b967b96751a20de2eabb8d70c8deb3a538531eedc4c16bdf
                                            • Instruction Fuzzy Hash: F7F08C3590824CEFCB00CF84C940AADBBB2FB59301F10D1A9D86883351D3369A12EF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8dffb5fc983823ad2eb052449247180c8c3a5a8cf5572216fb63100027dd24db
                                            • Instruction ID: 34515311bb4352e1ba02dc14653f48fc1efaf2bfbbf84ab69d8c07c5933d9ec0
                                            • Opcode Fuzzy Hash: 8dffb5fc983823ad2eb052449247180c8c3a5a8cf5572216fb63100027dd24db
                                            • Instruction Fuzzy Hash: 2E013C74A45118CFDB90CF58D9946AEBBF9FB48354F5080D4E50EA3344CAB49ED88F50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3473eecaa3faa65e667eaaaa32651fbb2763ec1d367194037c3f7b7d3e07973b
                                            • Instruction ID: 2bc5943f82a5e3bb7cfea11c10a5bf4605695dae99ee0403a8c8d83755a2ccb6
                                            • Opcode Fuzzy Hash: 3473eecaa3faa65e667eaaaa32651fbb2763ec1d367194037c3f7b7d3e07973b
                                            • Instruction Fuzzy Hash: E1F01C74D04288EFCB80DFA8D841AADBBF8EB48300F14C19AA868D3341D775AA51DF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a488ea349892d5947b2fbb5b53fc5557f91ea54de341f6a9f102d2e21581c8e5
                                            • Instruction ID: 7830fe8256c9dda3c475d58d1dc611482153a6fca78ff9e6ec4ad4520c4ae6a2
                                            • Opcode Fuzzy Hash: a488ea349892d5947b2fbb5b53fc5557f91ea54de341f6a9f102d2e21581c8e5
                                            • Instruction Fuzzy Hash: 99F0A73564C289AFCB02CF90C5419997F71EB66210F18C9DDDC484B253C772EA12C741
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a576c2ce2127c67277bd673782fdf8d8797a07b0fadd24f20690055a763a71b5
                                            • Instruction ID: d29c1e27f6b1dc292e998a45879bc51f8d8142846613e8b3ab8dcb2234346a3b
                                            • Opcode Fuzzy Hash: a576c2ce2127c67277bd673782fdf8d8797a07b0fadd24f20690055a763a71b5
                                            • Instruction Fuzzy Hash: 14E022F6A04108EBDB00EEA8D8413BD7BBAEB94208F4055A9D808D3301E9768F029795
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6a70953a155da7cdf65455b7e45d080060f75eb558feab3ac2d2bca9921d5647
                                            • Instruction ID: 86af41b9281ea0248c7b64cda93008652045c8c25c60ead47ae1e36b6f043f14
                                            • Opcode Fuzzy Hash: 6a70953a155da7cdf65455b7e45d080060f75eb558feab3ac2d2bca9921d5647
                                            • Instruction Fuzzy Hash: C4E0DF36304306AF8B061FA4A8D08BEBF62FF8E234340407AFA09CB211CA3248658710
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 69c453ebcdd151a44f781e9f38c00e509ebe04fc5749a9042cf68106fc2ff912
                                            • Instruction ID: c3cf07cc09996e40dcdeef20ead286203d2734947caf98933dcd921dbf50da72
                                            • Opcode Fuzzy Hash: 69c453ebcdd151a44f781e9f38c00e509ebe04fc5749a9042cf68106fc2ff912
                                            • Instruction Fuzzy Hash: 1CF06D38908108EFCB44CF94C445BADBBB1EB99300F10C995E85AA3341C7368B52EB51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cc432742d1da43285da1c1ffefe466489e0fee6c91df7edbe3f4b6f9e4cf8f1e
                                            • Instruction ID: b5105f82d39a6a3b1d2e461e5196210240e526924af591bf8f0d475f8945c522
                                            • Opcode Fuzzy Hash: cc432742d1da43285da1c1ffefe466489e0fee6c91df7edbe3f4b6f9e4cf8f1e
                                            • Instruction Fuzzy Hash: C3F03035D45208EFCB44DFA8D84579CB7F5EB88214F24C4AAC808D3340E6799B52DB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5c33ddb85e350ce6ec505e72e02a0517b0e3022ee767f9206bea05f7e4770c2f
                                            • Instruction ID: ecf8b207959baba704c7c2c1011475cfd8e4454312678799b3c2b5e98b543618
                                            • Opcode Fuzzy Hash: 5c33ddb85e350ce6ec505e72e02a0517b0e3022ee767f9206bea05f7e4770c2f
                                            • Instruction Fuzzy Hash: 57F0ED74D0638C9FDB50CBB8E4093B8BBF5AB62399F041899C40997142D7B21E98CB01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0c5b26a6ecb06b6f7deb7c65c56856a0e838e42e1f1792a0970470b43bf354fa
                                            • Instruction ID: c611f6f1beaa71c595970cdc459f8ad39dd7e52f5d14ba4b0cab49cbea1ee7e9
                                            • Opcode Fuzzy Hash: 0c5b26a6ecb06b6f7deb7c65c56856a0e838e42e1f1792a0970470b43bf354fa
                                            • Instruction Fuzzy Hash: A1E065B4D442889FC710CBD5C9452ACB7F0FB59345F15A1D5C86D43392D5354E42DB41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cefe92fd15aa659daae5d2adf49d061bb6b3dbb916b6c8ba88f10ce8dca6351d
                                            • Instruction ID: 3c9136c7199dc1ab711a9714622966bdef5c3272f38828b4ab77763bac0843c0
                                            • Opcode Fuzzy Hash: cefe92fd15aa659daae5d2adf49d061bb6b3dbb916b6c8ba88f10ce8dca6351d
                                            • Instruction Fuzzy Hash: 98F06D76D04208AFCB04CFA4D5457ACFBF9EB58300F14C0EAD80593341D676AB52DB84
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 30f63141a9ce1b826f9525a9ee745549ddb4135be7d3536f20266c67aa1d4dcd
                                            • Instruction ID: ce45db455100f21ca11c904f6ee42f6e58880e3fbe047d00492a86303a7bc119
                                            • Opcode Fuzzy Hash: 30f63141a9ce1b826f9525a9ee745549ddb4135be7d3536f20266c67aa1d4dcd
                                            • Instruction Fuzzy Hash: F5F08C34944248EFCB40CFA8C940AACBBB1FB55320F14C2DA986857292E7769A02EB00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 02e962ac90c3f668c14909f194d700353bf6236cfa2e8757195e6f1b33a14eec
                                            • Instruction ID: 0b326968ff0e7a873425d7560c212db50548bbc983a2208b260b78997e4a36fa
                                            • Opcode Fuzzy Hash: 02e962ac90c3f668c14909f194d700353bf6236cfa2e8757195e6f1b33a14eec
                                            • Instruction Fuzzy Hash: 1EF01C74D08248EFD741DFA8D94439DBFF1AB49314F14C1E99898A3382E7B59A41CB51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d19f9b6741cf069b78153b27726b513a2bc7ae7bca69e4760a9224574f9dcafc
                                            • Instruction ID: 94d150ffb512202cbf4185df51de363aa2713e66a7469b323f2a4fc58ade5ba4
                                            • Opcode Fuzzy Hash: d19f9b6741cf069b78153b27726b513a2bc7ae7bca69e4760a9224574f9dcafc
                                            • Instruction Fuzzy Hash: CBF0D435904208EFCB40DFA8D940A9DBBB5FB48300F14C599EC59A3351E6729A61EF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 66f8f2a2606fd337e93a16bbcbb11636133c4d265018674249c5812210bf8ed9
                                            • Instruction ID: 338e005242454ed8f9747a3a6a53673f3c6d356fb7a8888b7ae25e0d9d7bcfd8
                                            • Opcode Fuzzy Hash: 66f8f2a2606fd337e93a16bbcbb11636133c4d265018674249c5812210bf8ed9
                                            • Instruction Fuzzy Hash: CBF05875D08208EFCB50DFA8C880BACFBB4EB58300F1081A9984993341D672AA11DF94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2c9de1559235e977a30aed2c8d834eca8fe059d4b6b553e6371adf938c00c929
                                            • Instruction ID: 61caf1b91577944afcc0a6b5672e6118c99ffa98daf876ac7b5287e82e8239c9
                                            • Opcode Fuzzy Hash: 2c9de1559235e977a30aed2c8d834eca8fe059d4b6b553e6371adf938c00c929
                                            • Instruction Fuzzy Hash: BEF03074D05248DFD740DFA8D9457ACFBF5AB49304F14C1A9985893351D7769E01CF81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b465304cac889c595994be07fe5b6279b577e4943d90128e561bb1e879dd1154
                                            • Instruction ID: ec53b1050719acddfb8eb1f9ea9aef11f1f4e8c8f2bf625d465be9855838f60d
                                            • Opcode Fuzzy Hash: b465304cac889c595994be07fe5b6279b577e4943d90128e561bb1e879dd1154
                                            • Instruction Fuzzy Hash: DFF0E275908248AFCB00CF94C940AECFBF1EB65350F10C1999C6447392D2728A42DB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 634a005842ae0c5492cccbd4cead86d6b86feea4a577d867ba2cb1b2a930f09b
                                            • Instruction ID: b79ffe222a1d9c7cf17351051a36e40a81888ea95814d1eaec035c3cc18557d1
                                            • Opcode Fuzzy Hash: 634a005842ae0c5492cccbd4cead86d6b86feea4a577d867ba2cb1b2a930f09b
                                            • Instruction Fuzzy Hash: B3F0A075948288AFCB10CF94C9406ADBBF1EB55350F24D1DA886897392D3329A43DB42
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d096b42429f356721c04b528228319dcc9eb8c725fc41f84a1a01fcfdc81c84a
                                            • Instruction ID: 8ebc088fb89078d8988977fbc21ee3a49f16c17f29ada8fe1bb47f2474f506e1
                                            • Opcode Fuzzy Hash: d096b42429f356721c04b528228319dcc9eb8c725fc41f84a1a01fcfdc81c84a
                                            • Instruction Fuzzy Hash: DEE0123130120697C7149A5AE88495BFF9AEEC0265714953DE11E87515DEB4AD0586D0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2e9f2f1973135075cf6609fc725083ec6406d627453d551609e016ccc42fb559
                                            • Instruction ID: e1ee9eb8470ca5aec7c0b4cd801ad2dc52c096fc717269b6ee92c0707543d4de
                                            • Opcode Fuzzy Hash: 2e9f2f1973135075cf6609fc725083ec6406d627453d551609e016ccc42fb559
                                            • Instruction Fuzzy Hash: D3F06574D442889FC740DFA8C5406ACFBF0EB55354F24D5DAC89897392D6725E43DB01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6d6b16645019d1768a28a0013a437893c43124ec5ddcaefba098c7ec176c4f33
                                            • Instruction ID: 2da8e395a0babd9221c63411c2ddbd0cd9d80b0f12e3bb85553787eb462a8f45
                                            • Opcode Fuzzy Hash: 6d6b16645019d1768a28a0013a437893c43124ec5ddcaefba098c7ec176c4f33
                                            • Instruction Fuzzy Hash: BBE0DFF994C288ABD306CBA0CA00779BB61EB66345F2595999C99073D3E6739D02C681
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7cf8fe8463e9669f06107843d6b2ca800ae4a01d900d5596d90c4d512288a999
                                            • Instruction ID: a74332433d09fe1f1fd18f7af7d00fcff7e2de9a35ed53fc2ed406a157d7a343
                                            • Opcode Fuzzy Hash: 7cf8fe8463e9669f06107843d6b2ca800ae4a01d900d5596d90c4d512288a999
                                            • Instruction Fuzzy Hash: 09F01574E09248AFC794DBA8D9857AEFBF4EB88204F1084AD889993381E6759E01CB45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ba3f97510585252533d9c7cf3bf5c0d6e4dc68fd2083d755dfcfe0d62db2f3c4
                                            • Instruction ID: b62b3f7e037e001aed85f3248866464f741c913164eb59bc2148b1774fcec532
                                            • Opcode Fuzzy Hash: ba3f97510585252533d9c7cf3bf5c0d6e4dc68fd2083d755dfcfe0d62db2f3c4
                                            • Instruction Fuzzy Hash: 2EF030B4D04248DFC714CBA4D5506ADBBF0AB55319F2592DA8C6897392E2719A42DB01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f50bc48e4ab4469397ca3780294f9ecc3862088e595e84faab135513b774d318
                                            • Instruction ID: a753d6b549a4770a8522553e2be238b56c22a382c3af1e0301eefa462f93a2a1
                                            • Opcode Fuzzy Hash: f50bc48e4ab4469397ca3780294f9ecc3862088e595e84faab135513b774d318
                                            • Instruction Fuzzy Hash: 24F065B5D04148EBCB04CFA8D5453ACFBB4EB45200F14859DD84963342D7759F52CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5f77e4c84469e4328a6c982cfe4b1dfcbdaa119ce6eaed7458784da9c71b33bd
                                            • Instruction ID: feff503860fd9565bfbd1a5f7ef35ae2cb0b6af2fabb7d07c336c2943b24075a
                                            • Opcode Fuzzy Hash: 5f77e4c84469e4328a6c982cfe4b1dfcbdaa119ce6eaed7458784da9c71b33bd
                                            • Instruction Fuzzy Hash: 40F03974908248EFCB44CF98C844AADFBF8AB48200F14C49EEC5993341D6719F51DB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2c53f427f47bb51d77ea8ecc420df83455acfb3d1c8d8c71d793762dc89a069a
                                            • Instruction ID: aac1fa87d202bc01e129867aadd8b2872f9dd2a1f5097ddd3e1b13bb02e367d4
                                            • Opcode Fuzzy Hash: 2c53f427f47bb51d77ea8ecc420df83455acfb3d1c8d8c71d793762dc89a069a
                                            • Instruction Fuzzy Hash: E5E026B294220CDBC700EBA4C9097EE7BF4DB54200FC008A9C50993710FD755A10E6A6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c911393827cfbe79fa5b6678df945e7e57116827c700db7615b2fd1ff425bd27
                                            • Instruction ID: 7570ef564524bcbf7379cea7002988b801093f60df98325c1692dde558acab5a
                                            • Opcode Fuzzy Hash: c911393827cfbe79fa5b6678df945e7e57116827c700db7615b2fd1ff425bd27
                                            • Instruction Fuzzy Hash: B2E06538D481489BCB08CBA0D6813ACBBB1FB59242F148A99CC2983342D6768F52EB41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 35bcddb9fcf8d4d77dce350214bb5c5d4a19fc56d9f9aca52615e269d3798dce
                                            • Instruction ID: 7e249966902ea8ee6c4abc528a9c3cd39f24adc61d8367664dbbdd6a9af8c1ad
                                            • Opcode Fuzzy Hash: 35bcddb9fcf8d4d77dce350214bb5c5d4a19fc56d9f9aca52615e269d3798dce
                                            • Instruction Fuzzy Hash: 01E09271D48208AFCF84EBA8D8457ADBFF5EB09201F1085A9C808D3382E7719E41CB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 904b6d7fd9143712dd23811f6a51bea0b0ea7a1168590e69bb4dfa84b6c7100b
                                            • Instruction ID: d0fcc90a67491f191b7271ea359784e892641c964d05df16168bb4d575ece632
                                            • Opcode Fuzzy Hash: 904b6d7fd9143712dd23811f6a51bea0b0ea7a1168590e69bb4dfa84b6c7100b
                                            • Instruction Fuzzy Hash: 8EE09275904208EBDB04DAA0D84579DBBB5EB55304F108068D80463341E7759E62DB85
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c2a3077d113403087b973667845de54a6d2470dd914ed48e63c549ceb2f842c9
                                            • Instruction ID: 1a41b893aba3c20ea746bbd59a65ece48e5c9e689be1f9b810745989d6a736e9
                                            • Opcode Fuzzy Hash: c2a3077d113403087b973667845de54a6d2470dd914ed48e63c549ceb2f842c9
                                            • Instruction Fuzzy Hash: 58F0F279E05208EFCB84DFA8D9447ADFBF1EB88300F14C5AA9C18A3350D6769A55DF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8a3ac98b784ebc9e71dbf9906d73ad01929e8b17896a395f9d3c972f6da5883f
                                            • Instruction ID: ba0ee55583c9869618e2baed163ec420ba38e0a82a760fbd583e5ff7c479cc41
                                            • Opcode Fuzzy Hash: 8a3ac98b784ebc9e71dbf9906d73ad01929e8b17896a395f9d3c972f6da5883f
                                            • Instruction Fuzzy Hash: D7F0E571D483499FC700CB94C5406ACFBF0AB55310F2491DA8CA8473D2D2715A42CF01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5b4328b476317ac90846bd395200af0ea2cc9fd90fa6e4315fbe5e11570a07a1
                                            • Instruction ID: a7a557cc9caac9a1b15e5fc3fb5d70eb415a7fa426f747a479f09722882e974d
                                            • Opcode Fuzzy Hash: 5b4328b476317ac90846bd395200af0ea2cc9fd90fa6e4315fbe5e11570a07a1
                                            • Instruction Fuzzy Hash: 7DF0F478A05218CFD755CF18D99499EBBF9FB58700F5080C4E60A97388CA74AED8CF90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 27552abd04b78f806802397556113cefe3f63f46f1e4574ed3950eea43464491
                                            • Instruction ID: bebc9c262dcbeaf7becdb6dbc5fb797aaff2a71c0b21fa895f04e9aa8653aaca
                                            • Opcode Fuzzy Hash: 27552abd04b78f806802397556113cefe3f63f46f1e4574ed3950eea43464491
                                            • Instruction Fuzzy Hash: 8AF0A074E082889BC710CB98C5406A8FBF0AB45314F2082D9C898977D2D6759A02DB00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c974d99017c88130d1259e97730086b58149e43b621ce9fa92ab89fc9f8eab1c
                                            • Instruction ID: 9305c261b15fe1552011da9a2d57dc3c1bf4e6eb230ccf39630b2ef13bbb8a1b
                                            • Opcode Fuzzy Hash: c974d99017c88130d1259e97730086b58149e43b621ce9fa92ab89fc9f8eab1c
                                            • Instruction Fuzzy Hash: 34E09A75A0A108EFDB04CF90D9417ACBF76EB96354F2091A9DC4867350D7329E92DB84
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e2d07e76ee6ebe6a833d7ca7164e73e69e3f813e5d61cce9ad211e0b7f1674c0
                                            • Instruction ID: 60a2936f8f1d8759a4860fc78cd36b8b3a919532c00853cee86822d81121db6c
                                            • Opcode Fuzzy Hash: e2d07e76ee6ebe6a833d7ca7164e73e69e3f813e5d61cce9ad211e0b7f1674c0
                                            • Instruction Fuzzy Hash: 59E06D74A09248DFD740DBA8E98535CBFF0AB09215F248599C84883381E7728E55CB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 588b149a5689e0d2e455377df1d1903af1d2f0347c23ed1dc34d5c3efad6930c
                                            • Instruction ID: ddbf406d4fbbf043a05b583f1106da71e623311590ff58d78f184d67a8bd039b
                                            • Opcode Fuzzy Hash: 588b149a5689e0d2e455377df1d1903af1d2f0347c23ed1dc34d5c3efad6930c
                                            • Instruction Fuzzy Hash: E6F0C974E04208EFCB84DFA8D544A9DFBF5FB98300F10C5AA9C5893351D6769A51DF80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a291b98aa0c32ce1fba48870c8b05de2ad4d77315c73e69774efc9dfeb13e333
                                            • Instruction ID: 02287588e27f69c83eb93cfc886acc093f02690544414328d8127edeec4385f6
                                            • Opcode Fuzzy Hash: a291b98aa0c32ce1fba48870c8b05de2ad4d77315c73e69774efc9dfeb13e333
                                            • Instruction Fuzzy Hash: 6DE0D83890D348DFC705DF90E945558BF75AB46340F1081DDC808973C2D6719E5AC751
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f1b4fc1a330fbc18d697372a978cf4c2cdfa8e9862fc832caf1331d53d1c9052
                                            • Instruction ID: 7dcdaf32e9650f956c09ec337b3b5c60a2c632efcd99f31be89424e931db793d
                                            • Opcode Fuzzy Hash: f1b4fc1a330fbc18d697372a978cf4c2cdfa8e9862fc832caf1331d53d1c9052
                                            • Instruction Fuzzy Hash: E6E08635A09218EBCB04DFA4E9857ACFBB9FB45314F208598D80457342EB729F5ADB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9b8e9aed286e27889b8a68796e970aa878327e73c1d955e61f0f09b63c17e7f2
                                            • Instruction ID: 1326ca759ae4af125d6834ff4d88098b3ac50b49c1dc4855e6a766aae72c6f96
                                            • Opcode Fuzzy Hash: 9b8e9aed286e27889b8a68796e970aa878327e73c1d955e61f0f09b63c17e7f2
                                            • Instruction Fuzzy Hash: D3E01A75A44148DBDB84CB94C5857ACB7B1FB89255F10C699C81BA3341C6729F82DB41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5cc44acd2fa1de2bd0fa1aa7371acde4de719bfa598c3e187887cd77f609a10c
                                            • Instruction ID: 7f477af0ed2a76a45152eaed91a7de705e2bc46342da2b14553106b16e5b1045
                                            • Opcode Fuzzy Hash: 5cc44acd2fa1de2bd0fa1aa7371acde4de719bfa598c3e187887cd77f609a10c
                                            • Instruction Fuzzy Hash: 3AE0D8B5C0C248BFCB04DB74D946269FFB5DB45204F0485EAC84493382D9759F42C781
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9f416768cc2e4c6d89489588b9de5e69635ceee0653f230ce93226864cd2497f
                                            • Instruction ID: 9082ad22d804a92958ebc38949a1186a332559c9fb93b8370dd08838046ce712
                                            • Opcode Fuzzy Hash: 9f416768cc2e4c6d89489588b9de5e69635ceee0653f230ce93226864cd2497f
                                            • Instruction Fuzzy Hash: 93E0DF35C042089FD748CAA4C84A368BBF8EB45205F04859CC84957382E6739A42C740
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b7e9affd52b985ce7bb197c5db22af2de9e53b0104d8baeda8b2207280aea24a
                                            • Instruction ID: ca522ed118dbe4b037335d37e088a7f2c3f2300cca85349c73fb730abdd0b4ef
                                            • Opcode Fuzzy Hash: b7e9affd52b985ce7bb197c5db22af2de9e53b0104d8baeda8b2207280aea24a
                                            • Instruction Fuzzy Hash: 74E04F75909148EBCB04DFA4E9867ACF7B5EB96301F10959CC80863382D7B29E52D751
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6dd5bbd2513915b319e4bddf20ad3ea3a8d7360e370acecf203b7df38496e791
                                            • Instruction ID: 10bcdf8d07a2c149f12257c448758393661d9e89cec39904dad6afba1bac3605
                                            • Opcode Fuzzy Hash: 6dd5bbd2513915b319e4bddf20ad3ea3a8d7360e370acecf203b7df38496e791
                                            • Instruction Fuzzy Hash: 9AF065349042489BDB14CB94D4857A8B7F0EB45324F14C6D9C416A7392CB729A43DB41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4d155552bc2453a32b70a6cc8255a6b0784b6566f381e493b7685ad19827c24d
                                            • Instruction ID: d0d4988f3b67af93dba0e776bd17202f91484da5e832b001ff7c628b3b5ccd8c
                                            • Opcode Fuzzy Hash: 4d155552bc2453a32b70a6cc8255a6b0784b6566f381e493b7685ad19827c24d
                                            • Instruction Fuzzy Hash: 65F0C974E05208EFCB84DFA8D544A9DFBF5EB48300F14C5AA9C1893351D6769A51DF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7bda7c91594569740b857bb53cdf028b3f518d475e75c70ed8becb3f08ea4f6f
                                            • Instruction ID: 54a0275c347163740c27c80c0a04c78bce2343e2054e15ff8b7291db21669bc1
                                            • Opcode Fuzzy Hash: 7bda7c91594569740b857bb53cdf028b3f518d475e75c70ed8becb3f08ea4f6f
                                            • Instruction Fuzzy Hash: AEF0ED74D482999FCB00CBA8D8106ACFBF0EF46314F14A1CAC8A8973D3D2365A43DB00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 508d0303a4eff4c82432b940bddd707470422cfc7b716f22ceac5892aa1d02de
                                            • Instruction ID: 9a21d969e66fe293c77b026feae41ec4f0974c56faead1461edc263b1fcbd8ba
                                            • Opcode Fuzzy Hash: 508d0303a4eff4c82432b940bddd707470422cfc7b716f22ceac5892aa1d02de
                                            • Instruction Fuzzy Hash: BBE09AB18052489FDF40CFB8A44A3ECBFF0EB09214F2052A9C845A7600EF714A41CB00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 876dc5bf4f67a73257adbc4171dafc37c020e6d347aa1641059d11c8f333ded9
                                            • Instruction ID: 2a6d714f5a6072655bfe57ad17187fd27be248cf630cc37aea72f6eb70b0770a
                                            • Opcode Fuzzy Hash: 876dc5bf4f67a73257adbc4171dafc37c020e6d347aa1641059d11c8f333ded9
                                            • Instruction Fuzzy Hash: 75F039B4A442499FCB50CBA8C9857A9FBF0EB45218F208699C8689B391D7769A43DB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cc3f1d9b717b0f9f4d2a7aeb13eaeb7608dcc5755108a352fd923ff5381a2f66
                                            • Instruction ID: ff132d7b641cd9274ef6f071801b373b782231a85851fc1c1c9ff8ce8724553b
                                            • Opcode Fuzzy Hash: cc3f1d9b717b0f9f4d2a7aeb13eaeb7608dcc5755108a352fd923ff5381a2f66
                                            • Instruction Fuzzy Hash: 0AF06575D483589FDB10CB98C940BA9FBF0EB45315F2486E9C8A9973D2D3759A43CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cda2060acb80838e8b2a44df813f05445952f745152b0696050ae7601594793f
                                            • Instruction ID: cd8ea9b66c6373f362075ec3dc2162a859a3fa5c1ec53ab7d88fb1229dd35c0d
                                            • Opcode Fuzzy Hash: cda2060acb80838e8b2a44df813f05445952f745152b0696050ae7601594793f
                                            • Instruction Fuzzy Hash: D4E0D879944104DBD705CB90D540B59BBA9EB69304F14808CCC0447352D632AD13D640
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 056808a943ac3d4a10bb8cd2d34678a3fa2acede101d3cb2ad1db28e87b474d7
                                            • Instruction ID: af74884c50516c29089e1eb3bea1a2421da6ac0d4d861ffd3a1f96dfad5c899d
                                            • Opcode Fuzzy Hash: 056808a943ac3d4a10bb8cd2d34678a3fa2acede101d3cb2ad1db28e87b474d7
                                            • Instruction Fuzzy Hash: 48F0C239905208EFCB04DF98D940EADBBB5FB88310F14C5A9ED1867351D772AA61EB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1a4d76e6d0c7a91bc90bd8d83dbace2d56c9578cb1141a4542e8656266d03564
                                            • Instruction ID: 3a8b2828bcc4c3ae0c4ee22646abd6b353b167623ac072285a55f416e73d850c
                                            • Opcode Fuzzy Hash: 1a4d76e6d0c7a91bc90bd8d83dbace2d56c9578cb1141a4542e8656266d03564
                                            • Instruction Fuzzy Hash: E1E0DF75A48248DBC708CB98D945BA9BBB1EB65224F2885E8CC4847382C7779E53C782
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 89e145a08c1865cde79ba3a02ca8993c74e010ea6a917c56ede9353f1396588a
                                            • Instruction ID: bdb4ff6b77cc21fc0810d58ef69408ca689b2fedbb88e6c5445778b619ce30d6
                                            • Opcode Fuzzy Hash: 89e145a08c1865cde79ba3a02ca8993c74e010ea6a917c56ede9353f1396588a
                                            • Instruction Fuzzy Hash: DCE0C974E4424CEFCB44DFA8D9446ADFBF5EB48300F14C1A9981893341D771AA51DF81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d57b4b3136093c2ba0a53e83296f91e6e9e6a05ff3963eda51973265517a3fa6
                                            • Instruction ID: ffcd1c907c6a44f5e2a87cf4a3624e730cab2ba8ce217423cabd3fb138d1dbc5
                                            • Opcode Fuzzy Hash: d57b4b3136093c2ba0a53e83296f91e6e9e6a05ff3963eda51973265517a3fa6
                                            • Instruction Fuzzy Hash: D3E0CD30B44308ABEB14B5B48805B71329D9F45719F7018A5EE5E9F280EDB1DCC283E9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 88f7ef8f1f6b4f177785210709be6bc3e764c8e17b0b872760a522401b74fbed
                                            • Instruction ID: 876fef9a3dd0e82c4e2ea18761b78350fed341af8541aaa88f80902d286e69c0
                                            • Opcode Fuzzy Hash: 88f7ef8f1f6b4f177785210709be6bc3e764c8e17b0b872760a522401b74fbed
                                            • Instruction Fuzzy Hash: 93E06D38D08208EFCB44DF98C445AACFBF4EB48300F10C099EC49A3341C6719B51DB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 54b7e1b3ee64bb5e9e9d1c92fe46e6dbf6559ea1c9177116800fff4b6048331c
                                            • Instruction ID: e3d488ee7fac9a20be1f5b98f24ef0e29c773bf1bc04e8610421be566dc9a50c
                                            • Opcode Fuzzy Hash: 54b7e1b3ee64bb5e9e9d1c92fe46e6dbf6559ea1c9177116800fff4b6048331c
                                            • Instruction Fuzzy Hash: FDE0C274E04208EFCB85DFA9D544AADFBF5EB88300F10C5AE9818A3341D6729A51DF80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f73d4352e17b330f04c9af5c75ce73742d2ec2f247160a33e4e56ec47683182a
                                            • Instruction ID: e1ef2e2ce0fcc884fdf589fc4d8b5845b5f4cee3fdee2ed1e3a6c9841ad0aa25
                                            • Opcode Fuzzy Hash: f73d4352e17b330f04c9af5c75ce73742d2ec2f247160a33e4e56ec47683182a
                                            • Instruction Fuzzy Hash: 95E0D83490D248DFCB04DF94E94596DBBB4EB85304F108899D80453342D7729E42CB51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 53396be5e624aa663d4fc34c19837017c5a0d81bab353441580ebcb276be48ac
                                            • Instruction ID: 0ff1027a4a533e2324cdb05424db8ff12fb7094ae02b7d0fa5c0f3017ff81790
                                            • Opcode Fuzzy Hash: 53396be5e624aa663d4fc34c19837017c5a0d81bab353441580ebcb276be48ac
                                            • Instruction Fuzzy Hash: DAE06D74D04245DFD700CF98D6417A8FBF1EB45324F20929A8C5997381E7765A42DB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1e1b2006c89868403efe09dd393e9a003745bd926b777bb1d6617e5f8178c1f3
                                            • Instruction ID: 75e6142d31d97957d5745d04d751062383a0f8b226b2a4adf595d065b7bc9d49
                                            • Opcode Fuzzy Hash: 1e1b2006c89868403efe09dd393e9a003745bd926b777bb1d6617e5f8178c1f3
                                            • Instruction Fuzzy Hash: 0AE0ED74E04258EFCB44DFA9D5456ADFBF5FB48300F10C1A99858A3345D6719E51DF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 04757c39fb4f76920eca2aaa570de056d188a18a5d4252863acd840026d1a765
                                            • Instruction ID: e1ec865a216e7f578e869708c8088837aa96665e1906de23710d3b4e6164602d
                                            • Opcode Fuzzy Hash: 04757c39fb4f76920eca2aaa570de056d188a18a5d4252863acd840026d1a765
                                            • Instruction Fuzzy Hash: 5EE02074548108EBD704CB50D950BEEBB71EB55319F10D099CC5817382CA734D53C740
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e2825fad6d8f892d1c3f70229578a1856aa9cb8588a96ea97db0690d964e83e
                                            • Instruction ID: 03d055a19853f3ba1ec0b42959e574420fecf65f5c1d1cdedffd5103240e8295
                                            • Opcode Fuzzy Hash: 9e2825fad6d8f892d1c3f70229578a1856aa9cb8588a96ea97db0690d964e83e
                                            • Instruction Fuzzy Hash: 33E0C974E45208EFCB84EFA8D54469DFBF5EB58300F10C1A9981893341E6719A51DF80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e2825fad6d8f892d1c3f70229578a1856aa9cb8588a96ea97db0690d964e83e
                                            • Instruction ID: fa8d7a2b9407c19d0c1f980b4a3be489bb509b34d91159885b54ec239a5b12d6
                                            • Opcode Fuzzy Hash: 9e2825fad6d8f892d1c3f70229578a1856aa9cb8588a96ea97db0690d964e83e
                                            • Instruction Fuzzy Hash: EAE0ED74E44208EFCB84DFA8D9456ADFBF4EB48300F10C1A99818A3341E7719E51DF80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e2825fad6d8f892d1c3f70229578a1856aa9cb8588a96ea97db0690d964e83e
                                            • Instruction ID: 2fb93d0325ac5f306c8f75657460b0043f0fe96414477377ec80b5887fe912a3
                                            • Opcode Fuzzy Hash: 9e2825fad6d8f892d1c3f70229578a1856aa9cb8588a96ea97db0690d964e83e
                                            • Instruction Fuzzy Hash: 68E0C274E44208EFCB84DFA8D544AADFBF4EB98300F10C1AA9808A3341D6729B51DF84
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e2825fad6d8f892d1c3f70229578a1856aa9cb8588a96ea97db0690d964e83e
                                            • Instruction ID: 52b7ab2267cc7e0ba5089bcf284d2a43f5e711ed02b055df8a5ca5a2351e3102
                                            • Opcode Fuzzy Hash: 9e2825fad6d8f892d1c3f70229578a1856aa9cb8588a96ea97db0690d964e83e
                                            • Instruction Fuzzy Hash: D1E0E574E4420CEFCB84DFA8D944AADFBF5EB98300F10C1AA9808A3351D7729A51DF80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9e2825fad6d8f892d1c3f70229578a1856aa9cb8588a96ea97db0690d964e83e
                                            • Instruction ID: f9143b99d64635c937d0b8b2464e1428ebf86985e29e61d86e49992ab8f16b57
                                            • Opcode Fuzzy Hash: 9e2825fad6d8f892d1c3f70229578a1856aa9cb8588a96ea97db0690d964e83e
                                            • Instruction Fuzzy Hash: 35E0ED74E44208EFCB84DFA9D5446ADFBF4EB58300F10C1A9980993341EB759A51DF80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8f7d9a00bf156a857922a1925e9937db87e0841deab4abb495d87001db7d0dbe
                                            • Instruction ID: 80fae203dc8357a4ee92d6be2605c4f43c5c828592a5abf771de945b08331953
                                            • Opcode Fuzzy Hash: 8f7d9a00bf156a857922a1925e9937db87e0841deab4abb495d87001db7d0dbe
                                            • Instruction Fuzzy Hash: 66E01A39A08208EFCB04DF94D944AADBBB5FB99300F14C19DEC0417351D7B2AA61EB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4245a0d9ab36a74b11eb025fd8e751baee2ee17dcb687d2c030fbe07e1f55f9c
                                            • Instruction ID: e87c24b6c45caeb0ae4447438f9d3ae5d8fe9dfdb8da97d4b75e040772f4094f
                                            • Opcode Fuzzy Hash: 4245a0d9ab36a74b11eb025fd8e751baee2ee17dcb687d2c030fbe07e1f55f9c
                                            • Instruction Fuzzy Hash: E0E026792481449FDB00CB90C7017AABFBAEB57304F2881C898484B382C632EF43DB00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ef2049908ea25ef2f399e6e62030942b55bdcc83d2a05f2c99043ab0c861b5a2
                                            • Instruction ID: 0ad24cff1e6aa3253628fef769fd6af92ccf21a20c1af8a2e4af1a97162c949a
                                            • Opcode Fuzzy Hash: ef2049908ea25ef2f399e6e62030942b55bdcc83d2a05f2c99043ab0c861b5a2
                                            • Instruction Fuzzy Hash: 44E0E574E04208EFCB44DFA8D5446ADFBF4EB88204F10C5A98C48A3381EA71AA42CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ef2049908ea25ef2f399e6e62030942b55bdcc83d2a05f2c99043ab0c861b5a2
                                            • Instruction ID: c9122423ed9a3b2037b3aef4e46e8bab5a4f0868fc1605bcf997f3c8fee422b4
                                            • Opcode Fuzzy Hash: ef2049908ea25ef2f399e6e62030942b55bdcc83d2a05f2c99043ab0c861b5a2
                                            • Instruction Fuzzy Hash: 9CE0E574E04208EFCB84DFA8D5446ACFBF5EB88204F10C1A98C59E3341E6719A41DF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ef2049908ea25ef2f399e6e62030942b55bdcc83d2a05f2c99043ab0c861b5a2
                                            • Instruction ID: e985b7053003726db46acc49469ff43d51966fb8b285641a2ada1866d3dc84af
                                            • Opcode Fuzzy Hash: ef2049908ea25ef2f399e6e62030942b55bdcc83d2a05f2c99043ab0c861b5a2
                                            • Instruction Fuzzy Hash: 93E0E574E05208EFCB84DFA8D5446ACFBF4EB88304F10C1A9885993341E6719E41CF80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4531efef10c2a4752a509c0b418be58c9b9a7223b46ad9df5c4fa030cb4bf73e
                                            • Instruction ID: 8af0691376225c0bc84734dd60029f137b5b51c76fd7fbe989fba0a3d7f2356b
                                            • Opcode Fuzzy Hash: 4531efef10c2a4752a509c0b418be58c9b9a7223b46ad9df5c4fa030cb4bf73e
                                            • Instruction Fuzzy Hash: DBE0E578D08208EFCB44DF98D545AACBBB5EB88310F10C5AAEC59A7341D6729B51EB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f44210677eb890514469cdc0819353ab1f27d5ad97b7d6bc14a6cfe99806957c
                                            • Instruction ID: 711517decfb5a4edd17f12841af474ed24f42a46bcae11f8a8239de14890ec31
                                            • Opcode Fuzzy Hash: f44210677eb890514469cdc0819353ab1f27d5ad97b7d6bc14a6cfe99806957c
                                            • Instruction Fuzzy Hash: 14E0E574E04208EFCB44DFA8D9446ACFBF4EB88200F10C5A9C808A3341D671AA52DF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 087d6549b1d5c15c4f667204eaaf0d20780d2c12679754d5bd8d4ff30e67bc6e
                                            • Instruction ID: c01a6c05f862a646010ee55ffe0ddd8e77ae57e20df6d0082e92b2ba249631c3
                                            • Opcode Fuzzy Hash: 087d6549b1d5c15c4f667204eaaf0d20780d2c12679754d5bd8d4ff30e67bc6e
                                            • Instruction Fuzzy Hash: CFE02634549046DBD708CB94C6857A8B7F1EB46218F2C85CDC80843783C7778E03C700
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3ab0d1dfedad4ee755ac74382134a6daebd396cc99f9e9948fdbb6f817917815
                                            • Instruction ID: 729af5d646018a953e6ceb80d84292fc37bd5a7199b5a7d6853386a6406b9002
                                            • Opcode Fuzzy Hash: 3ab0d1dfedad4ee755ac74382134a6daebd396cc99f9e9948fdbb6f817917815
                                            • Instruction Fuzzy Hash: F5E02634689185DBE70CD7E4C644769B7B29B85318F1889CDCC18577C2CB339E43C680
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cf0cf70714a43798efab4a5cfe9077dccb86edeea1ec6b01dfeb1ad84522feb3
                                            • Instruction ID: d8de013c27710da5f82cd982998d7fdc37b1e417ff8ad257bba6d6c97019beef
                                            • Opcode Fuzzy Hash: cf0cf70714a43798efab4a5cfe9077dccb86edeea1ec6b01dfeb1ad84522feb3
                                            • Instruction Fuzzy Hash: DFE04F7190224CEBD701EBF0890879EBBF49B84300F4058AAD00567290FEB25A40D695
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e4b9c2f77fcdb5787e81e9dacf983586fc04bdabec4a6b7a14e85a265f6c74db
                                            • Instruction ID: a06fd5d28b010d910d8cadb301f9a16f1267bfa270a9c36ad951fb6e2bb55aec
                                            • Opcode Fuzzy Hash: e4b9c2f77fcdb5787e81e9dacf983586fc04bdabec4a6b7a14e85a265f6c74db
                                            • Instruction Fuzzy Hash: BFE01AB5D0020DAF8B40EFB9D8422AEBFF5EA58244F90446AD908E3700E67142418BD1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b6e47ab427f349f6abbb2eecc249a33cde88a9f8c9e12106ad10cfcac8712f16
                                            • Instruction ID: 874798b322bdd52599c32fef3710f0c9d431a1bcfd2ecbf95d88216d43b252b9
                                            • Opcode Fuzzy Hash: b6e47ab427f349f6abbb2eecc249a33cde88a9f8c9e12106ad10cfcac8712f16
                                            • Instruction Fuzzy Hash: C7E04F76902208DFCB44EFA0D64C79EBBF5AB58205F0089A9D509A3A60EB754A249B51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fb2a7ddb81bc962ac03b9425999efbfbd19e64c37f6b7a85d4d9b6c0bbbd10cb
                                            • Instruction ID: 62311afb87d88425098d09e2afacd4d4a60b48572f9bd6779036a6f4581f0da1
                                            • Opcode Fuzzy Hash: fb2a7ddb81bc962ac03b9425999efbfbd19e64c37f6b7a85d4d9b6c0bbbd10cb
                                            • Instruction Fuzzy Hash: EAE0E574E04208EFCB84DFA8D5457ACFBF4EB88304F10C5AAC85993341E6719A41CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fb2a7ddb81bc962ac03b9425999efbfbd19e64c37f6b7a85d4d9b6c0bbbd10cb
                                            • Instruction ID: 4f116b279af37a97ed6b58dc68a78d961db4aeae173b588bb70e629fc3250f7c
                                            • Opcode Fuzzy Hash: fb2a7ddb81bc962ac03b9425999efbfbd19e64c37f6b7a85d4d9b6c0bbbd10cb
                                            • Instruction Fuzzy Hash: 7FE0E574E08208EFCB44DFA8D5446ACFBF4EB88304F14C1AAC81893345E6719E52CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fb2a7ddb81bc962ac03b9425999efbfbd19e64c37f6b7a85d4d9b6c0bbbd10cb
                                            • Instruction ID: dced6e5ac9281aa48ad105373ee8240e195e54a228884931dc4a96ae0d8ebf76
                                            • Opcode Fuzzy Hash: fb2a7ddb81bc962ac03b9425999efbfbd19e64c37f6b7a85d4d9b6c0bbbd10cb
                                            • Instruction Fuzzy Hash: A9E0E574E04208EFDB44DFA8D5446ACFBF4EB88214F10C1A9880993341E6719B42CF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4c76a052232cc2f109878e0805266ea33f79d5dd0c9337170463e26889c254f4
                                            • Instruction ID: 65fc81be9aaa266fea1d200293a9d43d907d0da2648fa910bd2044b0cfb9e0c3
                                            • Opcode Fuzzy Hash: 4c76a052232cc2f109878e0805266ea33f79d5dd0c9337170463e26889c254f4
                                            • Instruction Fuzzy Hash: E5E01A74E08218EFDB44DFA8D5456ACFBF4EB89204F10D0EAD858D3382E6769A41DF40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 68535833649091def61881b14917da0b3aad0f1feca15ea3220582f4d2201372
                                            • Instruction ID: 4a389ec4fc974acd418478ccfb3cc483ffe874e066ce3a767bfcac3233c25d49
                                            • Opcode Fuzzy Hash: 68535833649091def61881b14917da0b3aad0f1feca15ea3220582f4d2201372
                                            • Instruction Fuzzy Hash: 02E0E574E44208EFCB84DFA8D5856ADFBF4EB89300F10C1A9881893341D6719E41CF80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7aaa48c7541a62a7ad5cdcf5207e629e988f03a6263b4dcd34eddff08c7032b5
                                            • Instruction ID: d5c2d0b31911ed7e5a09b514e64d6d23dfefc4a3466a23d220f5e59c2856574e
                                            • Opcode Fuzzy Hash: 7aaa48c7541a62a7ad5cdcf5207e629e988f03a6263b4dcd34eddff08c7032b5
                                            • Instruction Fuzzy Hash: C3E0E574D48208AFCB04DF94D5446ACFBF9EB88200F14C1AA984553341D672AA52DB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 576c1aa6a4e9d791031c3f26c3b6ab3bfc9a772a758e4564752ff3b1e5e18f1c
                                            • Instruction ID: da6f60822172d95db5e9630a2edc1149a3374e9adeee42057303846a85a16868
                                            • Opcode Fuzzy Hash: 576c1aa6a4e9d791031c3f26c3b6ab3bfc9a772a758e4564752ff3b1e5e18f1c
                                            • Instruction Fuzzy Hash: CCE0C2346890C4DBD705CB98C645768BBB2EF4621CF2885DCC84947383CA77AE43DB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 87f894cb92e4c595dea43bb799a1e003119bff92f459cd42ca31a6581464cedc
                                            • Instruction ID: afcc75a2eb09f3d4be0efba6a94cf397324f901ff92e7f77f1e214127b2c0e67
                                            • Opcode Fuzzy Hash: 87f894cb92e4c595dea43bb799a1e003119bff92f459cd42ca31a6581464cedc
                                            • Instruction Fuzzy Hash: 6EE04F78948208AFCB04DF94D640A6DBBB9AB56304F1481D9984557341C671AB51DB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aaeda8f62b196cc17dc47999b2501c1453228de80a58be3508a753930528014a
                                            • Instruction ID: 84536e644bb0fd7a2c701c3c7a5ba5be929f25cc4c212e42b00cf07aeddfb94d
                                            • Opcode Fuzzy Hash: aaeda8f62b196cc17dc47999b2501c1453228de80a58be3508a753930528014a
                                            • Instruction Fuzzy Hash: DDF0B274A41259CBDB10CF18E948BA97BB2FB45309F0004A8D109D7640DB789E84CB44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 71bf7c08406dae154d427f954efed415f9618eb4e1f8df89d1a1d99c193bcf2d
                                            • Instruction ID: c58d91074175ec0c359b1bdaf225d4882e6b932976bff89db50fd2c1717d2ad3
                                            • Opcode Fuzzy Hash: 71bf7c08406dae154d427f954efed415f9618eb4e1f8df89d1a1d99c193bcf2d
                                            • Instruction Fuzzy Hash: 34E0E578E04208EFCB44DFA8D5446ACBBF0EB88214F10C5E98809A3341D6B19A42CF80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f4b066cbfa4d487871d4f86400cea565cff1517a3647a258a5c201db7abf989f
                                            • Instruction ID: 8adc5823aa9051b64449f959abf1a197e54d73fc171cb875c8a305728eca3c04
                                            • Opcode Fuzzy Hash: f4b066cbfa4d487871d4f86400cea565cff1517a3647a258a5c201db7abf989f
                                            • Instruction Fuzzy Hash: ABE01A75E04208EFCB04DF98D545AACFBB5EB88300F20C1A9DC4853345E6729F51DB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ba335b8034a0b7482d974c030680edb8f977ca0b92ec8c350bb15ee1bd152069
                                            • Instruction ID: 10b085e9aaa92aef40ec7e7e6e480baccd57f7dcc29c2a383a2099c70db26d5b
                                            • Opcode Fuzzy Hash: ba335b8034a0b7482d974c030680edb8f977ca0b92ec8c350bb15ee1bd152069
                                            • Instruction Fuzzy Hash: 50F01574E44208CFDB50CF99E894BAE77F2FB49308F10D019D5A5AB249CB749985CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c038c886d1d8154b65394359f5f8b30ec526927785e4cdae1bf6972e067c8044
                                            • Instruction ID: 61a06eea92ed77293e5a11109ed8d8aa0270aa6487e382e573a9e0abf44966a8
                                            • Opcode Fuzzy Hash: c038c886d1d8154b65394359f5f8b30ec526927785e4cdae1bf6972e067c8044
                                            • Instruction Fuzzy Hash: F4E08679908208EBC704DF94D5449ADFBB9EB59300F14C19DDC0413341D772AE51DB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6042c56d87f1dc9723f949b5f193123c04b2cb7c9347dd6df4d1f002438a39ef
                                            • Instruction ID: d2ea9b3791b2d2d35c547e60c83dd32ceba1f361efeb45a1c900002f5bc00fae
                                            • Opcode Fuzzy Hash: 6042c56d87f1dc9723f949b5f193123c04b2cb7c9347dd6df4d1f002438a39ef
                                            • Instruction Fuzzy Hash: 53E012313105224BD715A659F9417E63BE6ABC8304B104624B405C7206EE70DC4A4780
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 01f0f21b9c395bbf3c55525202dd8ef1938750ca3b54c04ef86350ad881427ec
                                            • Instruction ID: 870e187f9b716e5653a6a4b902ed8f540037e6c6e92ed61c49f73c70d78c4cbd
                                            • Opcode Fuzzy Hash: 01f0f21b9c395bbf3c55525202dd8ef1938750ca3b54c04ef86350ad881427ec
                                            • Instruction Fuzzy Hash: 45F01578A442488BCB55EF14E88169DBBB2FB89315F008995E54EA3240CF709EC58F55
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d63fc4f35343d05acc75c0f19696747008ab4a1a282770edbd10ab7b4b4caef1
                                            • Instruction ID: f4600949b7e881c3fddf9a165d6d07279bf5e195ffe13a1da3a137f275846ae8
                                            • Opcode Fuzzy Hash: d63fc4f35343d05acc75c0f19696747008ab4a1a282770edbd10ab7b4b4caef1
                                            • Instruction Fuzzy Hash: 0CE0BF74A09208DFD744DFA8D94569CBBF5AB48204F1485A9CC4993341E7719E51CB85
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3e47bd0f020f68ef984d4bf27cb0ed840ffe11bc7cf75975a7e0ca2175d49ab8
                                            • Instruction ID: 07eed8206bbf7788058b81af8ff1cead5c383cb65f801b6b90e8a5a321fb5627
                                            • Opcode Fuzzy Hash: 3e47bd0f020f68ef984d4bf27cb0ed840ffe11bc7cf75975a7e0ca2175d49ab8
                                            • Instruction Fuzzy Hash: 50F01CB4A8111ACFCB64DF5AE8507AFBBB2EB94310F0080A59959A3784EA744E84DF54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: da38d158415253b9df54c8652ff9751435536186078386ebe6450d6eceee2900
                                            • Instruction ID: 3ede2bdb3d70662bafda7301b1b412f431c8b3086e4e86743ec135823d6e1103
                                            • Opcode Fuzzy Hash: da38d158415253b9df54c8652ff9751435536186078386ebe6450d6eceee2900
                                            • Instruction Fuzzy Hash: C2E01A74D0820CEBCB04DF94D5486ACFBB4AB88200F1085AD884963341D6719A42DB44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3663292696147fb9c84c04d6017f9cc5f3437d875b53ecf4fc378b6972d1cc89
                                            • Instruction ID: cbe74f39689b7db69c034b91df5561d4fcb8cdb9b26eacca073df5428aa90841
                                            • Opcode Fuzzy Hash: 3663292696147fb9c84c04d6017f9cc5f3437d875b53ecf4fc378b6972d1cc89
                                            • Instruction Fuzzy Hash: 91E0BF75945208DFCB44EFA8D54575CBBF5AB49204F1085A9880D93341E6719E51CB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9d8b21fd0dc6f0f490cfc1c8af32c7d61d5b69577afe3a35e8a1ef01c4822144
                                            • Instruction ID: eabe1f140f346c37aa964ffaf204289777799c1bba45179b728ae3dc557e22d7
                                            • Opcode Fuzzy Hash: 9d8b21fd0dc6f0f490cfc1c8af32c7d61d5b69577afe3a35e8a1ef01c4822144
                                            • Instruction Fuzzy Hash: B3E08634909208EBCB04DF94D5449ADFBB5EB55300F10C5A9DC0413341D7729E61DB84
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f8c0b74d5902222a26e6693365c0abaf69c6d5eef40652d63802c8a4e337cf0e
                                            • Instruction ID: 97237a050c35796fca74b3e6b4949192beceeffa1cbb3a9ca36a14451f53247a
                                            • Opcode Fuzzy Hash: f8c0b74d5902222a26e6693365c0abaf69c6d5eef40652d63802c8a4e337cf0e
                                            • Instruction Fuzzy Hash: 67E0C235908188DBDF04DB54D889769F7BCEB42314F1448CD8809A7352EAB2DE02D740
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 70b5c477ab3274d08fb349b5ee711f8c754314445494b61d2b1d3c9082440599
                                            • Instruction ID: 5903958c0d9f48f3250722eea9fc881e042801d2230eb8d76a86c787436b8618
                                            • Opcode Fuzzy Hash: 70b5c477ab3274d08fb349b5ee711f8c754314445494b61d2b1d3c9082440599
                                            • Instruction Fuzzy Hash: 1DE08C38908208EBCB04DF94D940AAEFBB9EB95304F10D1A9DC4423341DAB29E62DB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ce6ef55884aa4443cc7a692d4452f4aca53845badcfa5f4d9dde405c9dd33537
                                            • Instruction ID: a6d9a6f2329e69fdd9054bad99daa6ce997ad03ed9424b05a2b885091181ee2a
                                            • Opcode Fuzzy Hash: ce6ef55884aa4443cc7a692d4452f4aca53845badcfa5f4d9dde405c9dd33537
                                            • Instruction Fuzzy Hash: 0EE04F74E44208EFCB44DFA4D554AACFBF8EB88300F10C1E9C80867351D6719E41DB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 98b91157ff47a553f0bf7ac4467706253e327085dabf6efb80ffc76a2a4b6ebf
                                            • Instruction ID: ac112366a05dee9afb4dd330b1c22d317fd5e63301288ef0a73348d64ffd7295
                                            • Opcode Fuzzy Hash: 98b91157ff47a553f0bf7ac4467706253e327085dabf6efb80ffc76a2a4b6ebf
                                            • Instruction Fuzzy Hash: 1DE01234A49248DBCB04DF98D54566DFBB5EF85304F2481E9C80917342D772AE52DB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction ID: b4a1819f96f41e008327967aabe3f900c0111bf5eaf9fc08f5dd2030a156cfd5
                                            • Opcode Fuzzy Hash: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction Fuzzy Hash: 6CE01238909208DBDB08DF94D549A6DFBB9EB85304F1085DDC80917381DA72AE92DB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction ID: 29b8d468c16c65e32b5993f63e49209eea90039a4c29bc2224752d0704eb20e4
                                            • Opcode Fuzzy Hash: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction Fuzzy Hash: 91E01234E49208DBCB08DF94D94566DFBB9EF85304F20859DC80917341DB729F56DB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 04d0667820608fbec3b699c95f5de8c173a6d0b181d11efd90f09013c16b7c2d
                                            • Instruction ID: 3741679ef7eb1d565e121a4b38b7fd5c2d3a5ee0e6d3ed8dccf74e6a2395444a
                                            • Opcode Fuzzy Hash: 04d0667820608fbec3b699c95f5de8c173a6d0b181d11efd90f09013c16b7c2d
                                            • Instruction Fuzzy Hash: 13E04F34D04108EFCB44DF94D5456ACF7B5EB88311F10C5E9C80A63341D7719E41CB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f9871e9888a61ffe482c30a0564c56f497a700407b041b126b87e34f64bdae5
                                            • Instruction ID: faa221b5c59d1f0295b08c1e4dd1be26090b20f59f6b212563c11130e2a1ab8e
                                            • Opcode Fuzzy Hash: 3f9871e9888a61ffe482c30a0564c56f497a700407b041b126b87e34f64bdae5
                                            • Instruction Fuzzy Hash: C1E0127594120CDBC700EFF4894869E7BF89B55200F5149A9C50597150EEB15E10E795
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction ID: 24b96f5004674e30500a4f50dcceafca9cd45f938d534109021a84f3083b069d
                                            • Opcode Fuzzy Hash: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction Fuzzy Hash: 43E0C234D08208DBCB08DF94D54966CFBF8EB86300F24859CC80823341CB729E42CB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction ID: ef4a16ef64354c3a44a84cc2b2a5ac29c34ce2625e4990b69ceab063febaf513
                                            • Opcode Fuzzy Hash: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction Fuzzy Hash: 2CE01238D09208DBCB08DFD4D54966DFBB5EF85304F10999DC80917381D772AE92DB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction ID: 7c95e5387b216dbcd91cfc4017dcbe2753d1c49b6f8a034691c209648d568c37
                                            • Opcode Fuzzy Hash: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction Fuzzy Hash: 0BE01234D09248DBCB08DF94D54566DFBB5EB85304F10899DC80917341D7729E52DB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 325919e96525fc5ada915a9128e0e89a949590b8721f35c07e6e8111896890a7
                                            • Instruction ID: d9fbb53ef443ea85d065c4133149373cdfb52bebe983ba4695517b2617f3367c
                                            • Opcode Fuzzy Hash: 325919e96525fc5ada915a9128e0e89a949590b8721f35c07e6e8111896890a7
                                            • Instruction Fuzzy Hash: EAE0C2386480449BCB08CAD4C64466CB7A1AF45218F14898CC80A47382C673AE83C640
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction ID: 31d8fff79b1089ad6f222eaae170a04ea03ceff903d6d62ba40e2721dbfeca45
                                            • Opcode Fuzzy Hash: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction Fuzzy Hash: 63E0EC34909248EBCB08DF94D9456ADBBB9AB85304F1089DDCC0927341DB729E52DB85
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0443b1fd5fa2c5ec172b6eeb72a0bad9f4a4d0060b5a1677cb50a8faeb1a1993
                                            • Instruction ID: a365aaea5b63fcf3e3357cc31ee23d93f97d3335ac2edf11e04eb479d30ca8d3
                                            • Opcode Fuzzy Hash: 0443b1fd5fa2c5ec172b6eeb72a0bad9f4a4d0060b5a1677cb50a8faeb1a1993
                                            • Instruction Fuzzy Hash: 24E0127594124CDBC700EFF489086DEBBF99B45200F5059A9D50597650FEB24A10E795
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction ID: f42f32cae28472cea4eb396377b0152d8a0901f82f229949d8be3120d98b76e9
                                            • Opcode Fuzzy Hash: 490f16bbec4b0f17f4c842de5d452276eb64abaa6b057860f7eb537847ed015e
                                            • Instruction Fuzzy Hash: 6BE01234909208DBCB08EF94D98566DFBB9EF86304F10C59DCC0917381DAB29E52DB81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2f1bc84f739c2861ccff1aff760f231fd9ab72047d6ed8b246dd32ca5849dbeb
                                            • Instruction ID: 1ca1e02eb3d0cf5eb0b718ef3e0d0eaa79e9c2005a87c9a94dd310ce947a67ab
                                            • Opcode Fuzzy Hash: 2f1bc84f739c2861ccff1aff760f231fd9ab72047d6ed8b246dd32ca5849dbeb
                                            • Instruction Fuzzy Hash: 3AE08C3290220CDBCB00EFA4D50864EBBF89B59200F0048A9C10993111EAB14A109B91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b0d9249ef9ea9a6d87f7cdcdfb0a4add4f76a42ecfd65055cce370375c9382b3
                                            • Instruction ID: 02875d2f439157cfe0df61174d7799a06aae80487773440f8dd7b0909a893c28
                                            • Opcode Fuzzy Hash: b0d9249ef9ea9a6d87f7cdcdfb0a4add4f76a42ecfd65055cce370375c9382b3
                                            • Instruction Fuzzy Hash: 6CE0127194120CDBD701EFF4C50969EBBF89B45240F5055A9C549A7150EFB14E10E7A5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d214d4febca8a1ab58541dd6e8e6abfee7fd4779235e4dcbd84d5668d9cd31ac
                                            • Instruction ID: 1b9ebafde14b97970b8aa21b381c3f6eb497f9d539e5eaf811a45a0fe880167d
                                            • Opcode Fuzzy Hash: d214d4febca8a1ab58541dd6e8e6abfee7fd4779235e4dcbd84d5668d9cd31ac
                                            • Instruction Fuzzy Hash: 37E08C70D0620CDFCB40DFA8D5493ACBBF4AB08204F2002A88848A3240EEB04B40CB50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 705573a5a3fa43fac79cafe2644d0975b5eca13cbd46dc12c34571fcb658100d
                                            • Instruction ID: 25382298983a62eb5f6091e2b4f96bdbb13a121ce020b96084cb77cd597cbc0f
                                            • Opcode Fuzzy Hash: 705573a5a3fa43fac79cafe2644d0975b5eca13cbd46dc12c34571fcb658100d
                                            • Instruction Fuzzy Hash: 82E0C234D48208DBC744DF94D5446ECFBB4EB85300F20E198C80823351C7729E42CB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a7d956635a1c65ee56abde5e510de419a1f09761ea261a5cd3b975fc72e19552
                                            • Instruction ID: 8df14262380cda02c6c14a742261a17858c94e19971606017efb3fd988b5ccec
                                            • Opcode Fuzzy Hash: a7d956635a1c65ee56abde5e510de419a1f09761ea261a5cd3b975fc72e19552
                                            • Instruction Fuzzy Hash: 6FE01274A0120DEFCB00DFB4E95466DBBFAEB88314F104599D808E3304D9715F419B91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eee958fa61e99b1a69b31ae40f9dc2a2e7e94b15f1600a59b94f42498b2d52f1
                                            • Instruction ID: 55e2d8eb258fc6432f427d1b8b8e55cc2b82902579407cc3ad3e0160509c6402
                                            • Opcode Fuzzy Hash: eee958fa61e99b1a69b31ae40f9dc2a2e7e94b15f1600a59b94f42498b2d52f1
                                            • Instruction Fuzzy Hash: 72D05E34509148DBCB48CA94D548A69B3ACEB46308F1084DC880967341DAB2DE01D740
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 74ca48eea9d69d6617368e80b13f1445c108e32a0b5c989a7e2f705333605008
                                            • Instruction ID: f0f06c364c52ac97388c86124beff2fd7e295ed19b6288467a581dfed2bff74a
                                            • Opcode Fuzzy Hash: 74ca48eea9d69d6617368e80b13f1445c108e32a0b5c989a7e2f705333605008
                                            • Instruction Fuzzy Hash: F0D05E3490A208DBC744CA94D540A69F7ECDB46204F54C49C880957341DAB29E51C751
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6eca3339ba40c87b18f4313f20324e38f022440aebc9e55d4a341131d8178caa
                                            • Instruction ID: 8fc1090a593741ef2f703eed0d9ffc3a5c77068e0a3269808db38e2fb5694f4b
                                            • Opcode Fuzzy Hash: 6eca3339ba40c87b18f4313f20324e38f022440aebc9e55d4a341131d8178caa
                                            • Instruction Fuzzy Hash: 7AD0128198E3CA0FCB1791304D787912F719EE344434D01EF8582CF593E44C05055311
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f8c80cde295f309158f59a3ef6f059a37ff0e5a71933b30a1dd47f6e25b1fccc
                                            • Instruction ID: 32de63c654a000064e5a4911bead9c33357ab815c4739464c68231b58f8b6667
                                            • Opcode Fuzzy Hash: f8c80cde295f309158f59a3ef6f059a37ff0e5a71933b30a1dd47f6e25b1fccc
                                            • Instruction Fuzzy Hash: 65E01A74A023289FC750DF24E99479ABBB2EB86361F1050D8958EA3284CE705EC5CF15
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f209c6cea9c319ed31d7cdaf2842e653af118e159c20233f63828e1cab14d668
                                            • Instruction ID: 27d058814a75de77f6d81b5dd204254479ade8c115fd00c0bc293b18e0dc36d3
                                            • Opcode Fuzzy Hash: f209c6cea9c319ed31d7cdaf2842e653af118e159c20233f63828e1cab14d668
                                            • Instruction Fuzzy Hash: D7E01A74A40218CBD790DF24E894B9D7BB2FB84321F108198958BA3284CF715EC1CF24
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7669fbfb3e63744505eaad22347ca9437011657631231ae84af30107e651b2f8
                                            • Instruction ID: 64c09bf759cf7d97eb5efa11dfc97272591a0dc77267f9db916df6047f4b18c7
                                            • Opcode Fuzzy Hash: 7669fbfb3e63744505eaad22347ca9437011657631231ae84af30107e651b2f8
                                            • Instruction Fuzzy Hash: 10E01A34A01119CFE724DF64E854B99BBB2FF88351F204198D58EA3284CB345E80CF24
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f1242ae6ceec3d8a1866b8eb7bffef062e3432337723793e6d9a77331e84af2
                                            • Instruction ID: e4405167d7b7af0109eb0a99e1b9f834035acfe14749cc3903bec1e289491dca
                                            • Opcode Fuzzy Hash: 3f1242ae6ceec3d8a1866b8eb7bffef062e3432337723793e6d9a77331e84af2
                                            • Instruction Fuzzy Hash: 80E01A74A00218CBC750DF24E9997DDBBB6EB99325F000098968A67344CF705EC0CF15
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0ddfb16ec249805fd156101885657db8f27664e7f1e7edba5e1231f8fac100a6
                                            • Instruction ID: da3619e14abae542e124028184975af573cf74eeb20c77d00bc60e7897561af8
                                            • Opcode Fuzzy Hash: 0ddfb16ec249805fd156101885657db8f27664e7f1e7edba5e1231f8fac100a6
                                            • Instruction Fuzzy Hash: A2E01A74A04219CBDB10EF64E858B99BBB2FB88355F209099D45E67384CB305E80CF25
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3a697ba77a3de3618897e9b42936a1cd3fcd5ca11e560f56fc4d156a497b59a2
                                            • Instruction ID: 6b58ff67af27bf0ab6b571fcd28c0a3a0151d0b46a7a8d8477ecd8d6d373a2ff
                                            • Opcode Fuzzy Hash: 3a697ba77a3de3618897e9b42936a1cd3fcd5ca11e560f56fc4d156a497b59a2
                                            • Instruction Fuzzy Hash: 7FE01A74A4121ADBC760DF25EC947ADBB72FB89325F0080A9D41E63694DB705E80DF94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bfd2e1f72b8df23b0193a78607147acc8198516bf806e067c83cb3be4cb8bf10
                                            • Instruction ID: 4d502729b3f14da799c8e7dfbe6bd13f761a8b366ff8ea768da9b78fd3efbed9
                                            • Opcode Fuzzy Hash: bfd2e1f72b8df23b0193a78607147acc8198516bf806e067c83cb3be4cb8bf10
                                            • Instruction Fuzzy Hash: A0E0E535A01218CBD750DF28E854B9A7BB2FB89360F100198D54A63284CB705E80CF24
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: be315bf64f2a861328d780678ff7018eeacd01238cef26024bcd1846f1c815ca
                                            • Instruction ID: dfbef674ee2a38785a4df8d10fa3bc27fb352d0e90c7032b2b0ee8516626a26f
                                            • Opcode Fuzzy Hash: be315bf64f2a861328d780678ff7018eeacd01238cef26024bcd1846f1c815ca
                                            • Instruction Fuzzy Hash: 33E0B678A0021CCFDB94DF19E894B8ABBB2FB95304F10C19A9449A3384DFB49EC48F50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c120a849fc47c64a551238cb6a3db149daf793a632d2950d44a7df9f0e41c09b
                                            • Instruction ID: 0c603adbdb4c67be07e715dc85b30d083028bb205eabfee63791ede917aeb01e
                                            • Opcode Fuzzy Hash: c120a849fc47c64a551238cb6a3db149daf793a632d2950d44a7df9f0e41c09b
                                            • Instruction Fuzzy Hash: 11D01778E01108CFDB50CFA9E4486AEBBB2FB88304F40901AA945A7288DB749A468F11
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6d68a7bc0626bce8a07803a0b3d34e2747704f14fb0d96573d10e97282ff2588
                                            • Instruction ID: 2602b71db3066b845b1ad7a3abf8669077d6616b3e88280110c9c5c9ca41f015
                                            • Opcode Fuzzy Hash: 6d68a7bc0626bce8a07803a0b3d34e2747704f14fb0d96573d10e97282ff2588
                                            • Instruction Fuzzy Hash: EDE0B674946329CEEB65CF15C9887D9BAB1EB45308F50A199808D67294DBB40AC4CF05
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 78ac1527416c4233a7988d20d23283ecfc5987d803b70cb790f067b3a8d5d3dd
                                            • Instruction ID: 512388c9f71597b6323d05d57b636c0d7e2a80ff387095ddd2d4465586de2038
                                            • Opcode Fuzzy Hash: 78ac1527416c4233a7988d20d23283ecfc5987d803b70cb790f067b3a8d5d3dd
                                            • Instruction Fuzzy Hash: 06D022B30402099FC300ABB8DC04F403FE8DB06378F0842A1F4048B3B2E232DA00C640
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b9d73a9fddf741e1604fc8f1e2f8dec5de5537c5c4ba022b975979acf6cb0bff
                                            • Instruction ID: 15d95b1b6436fa40f772037e4b38484d442c052cffa9c3ad1ef1af9e339c58a9
                                            • Opcode Fuzzy Hash: b9d73a9fddf741e1604fc8f1e2f8dec5de5537c5c4ba022b975979acf6cb0bff
                                            • Instruction Fuzzy Hash: 39D0CA76000228ABC700CF94E882A807BA8FB29724F208090F6048B222DB36EC169A84
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 169e4c7196d8b036825b5bd685dc4a3f8b773baee0940a9f161818acf9561dad
                                            • Instruction ID: 0bb7cdf6391558309724b37c9583fc343b8d60ed4dcea9f4db99422fa1ff0cfd
                                            • Opcode Fuzzy Hash: 169e4c7196d8b036825b5bd685dc4a3f8b773baee0940a9f161818acf9561dad
                                            • Instruction Fuzzy Hash: D0C08C75A82308C2D300B7F5614C7BCBAE85BE0641F08A941E94C618C15EF68060CABA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 696ae7f8f39b7f113d27d07608b1af524a13ea54c55f9a24cf6e2913af5b5a0d
                                            • Instruction ID: 1c00b1d7132c83776c9a3a8433ccb90f2b1f4db6a9e22777d1fd42318b316677
                                            • Opcode Fuzzy Hash: 696ae7f8f39b7f113d27d07608b1af524a13ea54c55f9a24cf6e2913af5b5a0d
                                            • Instruction Fuzzy Hash: 7CD0123240524C7BD701DAA4ED46799FF359B0A624F0C845AB24467213C6259551DB92
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 99e99f985a3a0d72b6567455222e1e76a5a51983f4fcf9e0a1723233464a7a29
                                            • Instruction ID: 1c2d9a6aa59148e54473e1fd599700afd7679e6c75a26d352cc3d95ba7dda690
                                            • Opcode Fuzzy Hash: 99e99f985a3a0d72b6567455222e1e76a5a51983f4fcf9e0a1723233464a7a29
                                            • Instruction Fuzzy Hash: 94C08C3468230882D300B7E4610C768B6E81BA0501F006800D44C518C11AE48060CA76
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 526358afac5dd021d3bf924df413184129c9111a389eac49a8e45e2c0d7775a2
                                            • Instruction ID: eaf5a79d8670fd785d9b9144ff9e61937a384f2630c33cb765913234ab33393a
                                            • Opcode Fuzzy Hash: 526358afac5dd021d3bf924df413184129c9111a389eac49a8e45e2c0d7775a2
                                            • Instruction Fuzzy Hash: 24D092B4904328CBDF50DF64DD88ACCB7B2BB45204F0051998609BB200C730AD818F18
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f26be022bf0a550ffec8128deb4517a22dc9c0f0f6f8248b99d7690ef61733be
                                            • Instruction ID: c850c45617216a32257bf9aa2acfcdcf35d9a1271ac17feea59faa53dc1fd974
                                            • Opcode Fuzzy Hash: f26be022bf0a550ffec8128deb4517a22dc9c0f0f6f8248b99d7690ef61733be
                                            • Instruction Fuzzy Hash: CBC00276F1015DDBCB00DFDAF8448DDF775FB94325B009026DA14A7208D630A966CF90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a6cdab98c8e4a894a90c6678126353e29320525f184aa87f341a8965ef9b1647
                                            • Instruction ID: 103eaa28950575cf13b671fe462160232886dff9ffe2cfab427c5fbe6d840e04
                                            • Opcode Fuzzy Hash: a6cdab98c8e4a894a90c6678126353e29320525f184aa87f341a8965ef9b1647
                                            • Instruction Fuzzy Hash: FCC01274C0121ECBCB10CAD8D44A2BDBFF0EB84346F0008499A0A56600CAB240A0CEE1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0b04e1305a2707ef585eafb0b1613303804d6ea7163be25cf71b3bc49f938db6
                                            • Instruction ID: dbbc13be21eb7e936558fec516dadf2485f1e9701cce9313afb7ecd3b13cf9b2
                                            • Opcode Fuzzy Hash: 0b04e1305a2707ef585eafb0b1613303804d6ea7163be25cf71b3bc49f938db6
                                            • Instruction Fuzzy Hash: 17C08C2D04C2CC1FEB2213B124668E53F3089270A430A00F6ECC592053C089082BCB18
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 78e97fec66e029167fc4a2edd18a65547133f76a7ff1dc7f3196544fb12c5a24
                                            • Instruction ID: 8b672ff749a7d2a952ce73d0ea10bfc401d8f42506bbb7f49542598b45b9c2ee
                                            • Opcode Fuzzy Hash: 78e97fec66e029167fc4a2edd18a65547133f76a7ff1dc7f3196544fb12c5a24
                                            • Instruction Fuzzy Hash: 64C08C70288208C7E300EB64E0647BB3B33EBA0765F0051159A430B684DFB44CC68B68
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                            • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                            • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                            • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 22f30ef9ffb21a6b6625911733cacdaf7a8c61d636b69b99d0efa39b11b4aa7c
                                            • Instruction ID: 1dbdf7d22eef536b981c599776b88a03762a7aa5a74fe0de4039f3b6a44b1478
                                            • Opcode Fuzzy Hash: 22f30ef9ffb21a6b6625911733cacdaf7a8c61d636b69b99d0efa39b11b4aa7c
                                            • Instruction Fuzzy Hash: F9C08C3024810C87D350AB58E85429B3B32EB90369F000004918202188CFB448C0C618
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: afabf289a478e1d3f715c2cf46ed32c6c4453da790de25b8c108227220caa0e1
                                            • Instruction ID: e97a67416c0dc0d65330a2b3660ee78b2d7db02e1a13ec6f46fff46f65bb2c14
                                            • Opcode Fuzzy Hash: afabf289a478e1d3f715c2cf46ed32c6c4453da790de25b8c108227220caa0e1
                                            • Instruction Fuzzy Hash: 22B0920E44E2D14FE20713B408321896FA0AC97144B8D08C6CAC18A1529199480B831B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 24ca306c00c4f99686099a8406b3cb49e9ce0ba34b16c4725a04282eaf636b2d
                                            • Instruction ID: 8aab9c2dc37cd281e94326a0127ae51ed29fba3ba7a1f980a4fb72196e8fa0e5
                                            • Opcode Fuzzy Hash: 24ca306c00c4f99686099a8406b3cb49e9ce0ba34b16c4725a04282eaf636b2d
                                            • Instruction Fuzzy Hash: 8FB0923204020CAB86009E84E808855FB69AB59740700C029A6090A2228B32A822DA95
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144802290.0000000005CB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 87a43bf1af5557a44ce7c1898343f3ca808bb09fe63cc1a93ca5050298a16e7e
                                            • Instruction ID: ef089a48d94fca07cb5ec4fdf0350751fd451c64cc6bb0f149a2ea74757a83cf
                                            • Opcode Fuzzy Hash: 87a43bf1af5557a44ce7c1898343f3ca808bb09fe63cc1a93ca5050298a16e7e
                                            • Instruction Fuzzy Hash: 83B0123430043083E200BF40E84B3D43321F751300FF10E08904195032E7F84C09C204
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7c22a5ffea3a3386c1ea354beb91dc04128877e38fcdf7f7145f594b0759017d
                                            • Instruction ID: 307e7f94de3dc1c93c7433c86259cf0fbbc5d706031615a947b2ed44fec39f50
                                            • Opcode Fuzzy Hash: 7c22a5ffea3a3386c1ea354beb91dc04128877e38fcdf7f7145f594b0759017d
                                            • Instruction Fuzzy Hash: FDB012B65040209FC645D604CE4F52B7BA2EBD0734700C4257040C3424DB309911D580
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c17d179fdfa283d0e707566dcbd959f1ad8fbe92528c71fa9fb9ce3d4fa2be16
                                            • Instruction ID: 8b211fd8bcf662e6d6f2b3807cc28450e63cd2ba187e70cf17bc03c429592592
                                            • Opcode Fuzzy Hash: c17d179fdfa283d0e707566dcbd959f1ad8fbe92528c71fa9fb9ce3d4fa2be16
                                            • Instruction Fuzzy Hash: E8902230080A0C8F080023803008A80B3ECC0000223820000B00C200000A88202000A0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: f
                                            • API String ID: 0-1993550816
                                            • Opcode ID: ba0544004ce8fc4d9cd1a7bac0d50c0d8ec90005bfb4f72ac34a7df28d9338b5
                                            • Instruction ID: 72a402b1becbb4caa6b411ea72803a2ca631b4526b629ceee336f75c0f45e0ce
                                            • Opcode Fuzzy Hash: ba0544004ce8fc4d9cd1a7bac0d50c0d8ec90005bfb4f72ac34a7df28d9338b5
                                            • Instruction Fuzzy Hash: A313D47A600114EFDB468F94DD44E5ABBB3FB9C314B0680D4E6099B276CB32D9A1EF50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $$5
                                            • API String ID: 0-1734218411
                                            • Opcode ID: 897d2e44f1585b4d8bd37e7f694c09f4c839257cfcf18c5c842b7328550aa8f4
                                            • Instruction ID: 9d2cbbcdbbf1ec586efa772a5d2d61193968ab2c4075fa5c7cb52143f99e7a42
                                            • Opcode Fuzzy Hash: 897d2e44f1585b4d8bd37e7f694c09f4c839257cfcf18c5c842b7328550aa8f4
                                            • Instruction Fuzzy Hash: 7731EF71D09668CBEB18CF67CC546DEFBF7AFC9300F14D06A8449AA258EB744985CE00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144117092.0000000005BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5bb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 47aa66a67859bac09d0620901cca7345962a06e837a0df3e95729614b85aba62
                                            • Instruction ID: c206ded5eecdad5134aefb12dec48b5303ba0960e9e443985737979f29ba40ad
                                            • Opcode Fuzzy Hash: 47aa66a67859bac09d0620901cca7345962a06e837a0df3e95729614b85aba62
                                            • Instruction Fuzzy Hash: CDF2A174909348DFEB16CBA4C898BBE7FB1FF46304F154596E140AB2A2C7F4A845CB61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: #
                                            • API String ID: 0-1885708031
                                            • Opcode ID: 2f25efc4ec41e173c69f01f089f8d8462a5ee30db200b9c273ee6a4a7fe5954f
                                            • Instruction ID: 15ab1b0e162c823b8cb31a93b6fbb0cc9aef68901e1943a80c6a86a826e0dfdb
                                            • Opcode Fuzzy Hash: 2f25efc4ec41e173c69f01f089f8d8462a5ee30db200b9c273ee6a4a7fe5954f
                                            • Instruction Fuzzy Hash: 0EA1E171D14219DFDB14CFA9D884BAEBBF2FF49304F1881A9E808AB250D774A984CF54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: pqI
                                            • API String ID: 0-1078129942
                                            • Opcode ID: 7b0eaff6a26f17c4961b9e6ee6b2f95246137e904e71f7e4430b24ea5b52853c
                                            • Instruction ID: affba725b47eba5a6f5af397e2ca5b4674d15f97ea8ac5d163392e3c2ee80ca8
                                            • Opcode Fuzzy Hash: 7b0eaff6a26f17c4961b9e6ee6b2f95246137e904e71f7e4430b24ea5b52853c
                                            • Instruction Fuzzy Hash: D3415CB0E5521ACFDB44CFAAC4406EEB7F2BB89340F54E865C456E7309E3348A828F44
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: pqI
                                            • API String ID: 0-1078129942
                                            • Opcode ID: 21a2b9d39b6b771b107381e6bfbf2d069482dcf807eca42ba4dd1550d083b1c1
                                            • Instruction ID: 7831ef1985003230b89448a422915c78d4b4c7ed63f22b29eefdc8cdb8270643
                                            • Opcode Fuzzy Hash: 21a2b9d39b6b771b107381e6bfbf2d069482dcf807eca42ba4dd1550d083b1c1
                                            • Instruction Fuzzy Hash: FA416DB0E5521A9FDB40CFA9C4402EEB7F2FB49380F54E965D456E7346E3388A428F44
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $
                                            • API String ID: 0-3993045852
                                            • Opcode ID: 776108e944ed3bf944dab555e6384ae9ba4d5759738beb3dd9a9f57d04f0e5c5
                                            • Instruction ID: a71f112eadb0a5355883a303c130a72030ef9ee633cb6c1fbae3c97336769ade
                                            • Opcode Fuzzy Hash: 776108e944ed3bf944dab555e6384ae9ba4d5759738beb3dd9a9f57d04f0e5c5
                                            • Instruction Fuzzy Hash: 913152B5E445098BEB08CFAAC8452BFBBF7AB88300F18D965C415E7694D778DA42CB40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: l
                                            • API String ID: 0-2517025534
                                            • Opcode ID: b548eb2e9313c9af59b099e0cb3f5776d8997f3f4eb079e2579774a70fc1819d
                                            • Instruction ID: f0c1b241eae0de8ae079761245da9b218236a29b879562aca50367fe24e2a3a3
                                            • Opcode Fuzzy Hash: b548eb2e9313c9af59b099e0cb3f5776d8997f3f4eb079e2579774a70fc1819d
                                            • Instruction Fuzzy Hash: D141B370D04628CBEB69CF6AD88879DBAF6AF88304F10C1EAD40DA7254DB701AC58F40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: C
                                            • API String ID: 0-1037565863
                                            • Opcode ID: 7e858359ac5e24b05ae14908faa049905c1e1c6966b7d1b451cc59ecc1d3ae8e
                                            • Instruction ID: 5c25412ad713da2f4916a382bd7448fbb6059fabf6df77dae99866e9ac997936
                                            • Opcode Fuzzy Hash: 7e858359ac5e24b05ae14908faa049905c1e1c6966b7d1b451cc59ecc1d3ae8e
                                            • Instruction Fuzzy Hash: 923100B1E056588BDB1DCF2BCC503DAFAF7AFC5200F08C0FA8508AA255DB740A858E54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: -
                                            • API String ID: 0-2547889144
                                            • Opcode ID: 270d2aa3806dab0db146f1f83ff3853d2e3623b6c0f0b04dd6852e5773aa5ea5
                                            • Instruction ID: fd17a65b46255e25dd6fe01a65939b6522305b3db647ec5a1e134bd97f114c35
                                            • Opcode Fuzzy Hash: 270d2aa3806dab0db146f1f83ff3853d2e3623b6c0f0b04dd6852e5773aa5ea5
                                            • Instruction Fuzzy Hash: 8C212FB1D057988FD719CF678904299BBF3AFC9300F08C4BAD858AB256E6740946CF14
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144117092.0000000005BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BB0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5bb0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a52d278b12bef26369c7c5979bb2e72fb91ab977312686bb1e87cbedbd68a50c
                                            • Instruction ID: 8f06bba5c1b3fde5d72110757ed8adebeb41a2ea6f52197a638528cb84b1a723
                                            • Opcode Fuzzy Hash: a52d278b12bef26369c7c5979bb2e72fb91ab977312686bb1e87cbedbd68a50c
                                            • Instruction Fuzzy Hash: E7B2A175509384AFDB178B74CD59FAA7FB4AF06304F1A45DAE1409B2E3C2F89844CB62
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $
                                            • API String ID: 0-3993045852
                                            • Opcode ID: 5771eff22fc5aec437aa81e55bc6af68ba3f651b63de14d391ebc6dc1a036f84
                                            • Instruction ID: 9090bca41fbe99597254a625ba3931c342e3472dd01563efc70d669057df0c0a
                                            • Opcode Fuzzy Hash: 5771eff22fc5aec437aa81e55bc6af68ba3f651b63de14d391ebc6dc1a036f84
                                            • Instruction Fuzzy Hash: 301184B4E446098BEB04CFAAC4446BFBBF7ABC4300F18D565C415E7254DB78DA028B80
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: XwU
                                            • API String ID: 0-2450326189
                                            • Opcode ID: 92e53881087db6b34f0a0b98cbd87e83569e4a68386ef788a3c9a9ecc5414a87
                                            • Instruction ID: 851c415681a09d609c0f82f3f691c5390df0d350f18917cb53ffe4b2c5e331bb
                                            • Opcode Fuzzy Hash: 92e53881087db6b34f0a0b98cbd87e83569e4a68386ef788a3c9a9ecc5414a87
                                            • Instruction Fuzzy Hash: 3D11B674E5410ACBEB88CEA9D4416BF77F7AB84300F59E566C009E7744D378E9424B44
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: XwU
                                            • API String ID: 0-2450326189
                                            • Opcode ID: dd90112289eba2342a5c172816aa97b9884a05f841260bf9185bf34a1d27a8c8
                                            • Instruction ID: 851c415681a09d609c0f82f3f691c5390df0d350f18917cb53ffe4b2c5e331bb
                                            • Opcode Fuzzy Hash: dd90112289eba2342a5c172816aa97b9884a05f841260bf9185bf34a1d27a8c8
                                            • Instruction Fuzzy Hash: 3D11B674E5410ACBEB88CEA9D4416BF77F7AB84300F59E566C009E7744D378E9424B44
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: -
                                            • API String ID: 0-2547889144
                                            • Opcode ID: 866dd1cd5257b8ab43d71dbdf5d94e2b0dd90a6b44d3809610a4ee12f7d5663e
                                            • Instruction ID: 4da1fa7c2aedad9bf811ec9ed364a719d028522bd8f5051209a3c943e3c2caeb
                                            • Opcode Fuzzy Hash: 866dd1cd5257b8ab43d71dbdf5d94e2b0dd90a6b44d3809610a4ee12f7d5663e
                                            • Instruction Fuzzy Hash: F121DEB1E056188BEB18CF6B99041DDFAF7AFC8300F04C4BAD508A7214EB710A868F54
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: *
                                            • API String ID: 0-163128923
                                            • Opcode ID: 2cef987f94fc33ef86424b2a111ea332bd6d477bc2b30d3803fa66146ac50b4b
                                            • Instruction ID: f9280d441df73e43a2e8a2f32ebd99ac78b9ee678a9762067fc259c54bf1c61b
                                            • Opcode Fuzzy Hash: 2cef987f94fc33ef86424b2a111ea332bd6d477bc2b30d3803fa66146ac50b4b
                                            • Instruction Fuzzy Hash: 40110A71E456198BDB18CFABC8442AEFBFBABC8300F18C57A9419AB255DB745502CF40
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 5
                                            • API String ID: 0-2226203566
                                            • Opcode ID: c0fc5c28db13ae547e2d2e274b43ff6c43079fd13fec65aac9f7e1da4bf3eee5
                                            • Instruction ID: d6678e9bccc9b8f907f987f068b12588e7db7366f256b9d6ff1c06c8e23835e0
                                            • Opcode Fuzzy Hash: c0fc5c28db13ae547e2d2e274b43ff6c43079fd13fec65aac9f7e1da4bf3eee5
                                            • Instruction Fuzzy Hash: DE219D71E05A588BEB18CF5B8D452DDFBF3AFC9300F14D5BA8848AA668EB744945CF00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d5288085e4a2d35cc10c0672a5e97dac8ebf0f510df8bcff37290b49ac62f4a0
                                            • Instruction ID: a6ba2946342e5c16bf757f54a86315c434adb89d59c166a36526a6b5e1cbae20
                                            • Opcode Fuzzy Hash: d5288085e4a2d35cc10c0672a5e97dac8ebf0f510df8bcff37290b49ac62f4a0
                                            • Instruction Fuzzy Hash: 1C12C671E046589BDB14CFAAC98069EFBF2FF88304F28C169D459EB219D734A946CF50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a73b8d75189f83eef54229db0b094625a43cc7fc39f7720c7561594a9b88d9d6
                                            • Instruction ID: ee0c94ffca48d61e3e6c36d7b8119ae670b4686b63462191f6cf0b697e7d5910
                                            • Opcode Fuzzy Hash: a73b8d75189f83eef54229db0b094625a43cc7fc39f7720c7561594a9b88d9d6
                                            • Instruction Fuzzy Hash: 5ED12C34A00205CFDB14DF68C584AADBBF2FF88314F659569E855AB361DB70EC81CBA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b60e1088438fad81e9ba04a46460f445e32d780d638dffd70d0e9397c2b6edf9
                                            • Instruction ID: 3b77424eafbdf5fb7b3c3a53ee281163491befd1863615ed9266337d3c551e41
                                            • Opcode Fuzzy Hash: b60e1088438fad81e9ba04a46460f445e32d780d638dffd70d0e9397c2b6edf9
                                            • Instruction Fuzzy Hash: 4AC10874E06218CFDB14CFA9D984BADBBF2FF49304F1090A9D849A7254EB749985CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5d597da4f18705599ae26a9099ef99cc35c6dffcfd710d196f2c3f101c9926b9
                                            • Instruction ID: b90369e55d01b4a1c0ba6407b5308c23ce68dddd4bae88cd440e9c93be59a3d4
                                            • Opcode Fuzzy Hash: 5d597da4f18705599ae26a9099ef99cc35c6dffcfd710d196f2c3f101c9926b9
                                            • Instruction Fuzzy Hash: FCB10774E01218CFEB14CFA9D984BADBBF2BF89314F1090A9D849A7245DB749D85CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5969e4238d89938996d1cb644690c78d8146bf5a99952224d0ffde1413771f0e
                                            • Instruction ID: aa4e764b8789706f0b8438299479e09c21a8fc24015fcb92a751b37dad1a46ec
                                            • Opcode Fuzzy Hash: 5969e4238d89938996d1cb644690c78d8146bf5a99952224d0ffde1413771f0e
                                            • Instruction Fuzzy Hash: C9B10870E05218CFEB24CF6AD844BEDBBF2FB89304F1091A9D849A7651DB749985CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5a77511008b4f0f2d0990de23bdc503990385a7a10d241942b97470b243a3113
                                            • Instruction ID: b03771e9c67ee827def98d4ef8e20a543f0ce1d8df05d1282f57db52135e3fcb
                                            • Opcode Fuzzy Hash: 5a77511008b4f0f2d0990de23bdc503990385a7a10d241942b97470b243a3113
                                            • Instruction Fuzzy Hash: BFB14B70E01218CFEB24CF6AD844BEDBBF2FB89304F1091A9D849A7651DB749984CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144840675.0000000005CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cc0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 96f82f1ff1c2bc1a241dc10b8fb84544f9e4f26d1985818ca6191a4c9a5d8df3
                                            • Instruction ID: 8f86d12afd826b9df7db40b00bcf2f301e8469ed5ca2e49a48730a0ae31f0b34
                                            • Opcode Fuzzy Hash: 96f82f1ff1c2bc1a241dc10b8fb84544f9e4f26d1985818ca6191a4c9a5d8df3
                                            • Instruction Fuzzy Hash: 0391DFB4E05209DBEB04CFAAD5447EEBFF2BB88314F14A8AED509B7240D7744A46CB54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6f6c63d06800a1c718ade95c2d87595c5fa3a4ac585bd3e299e8be8798d69bcb
                                            • Instruction ID: ca5224e2d16fa256830b30ac29df6252b33fbb1f4312eb1aa9dbea9ad7b96089
                                            • Opcode Fuzzy Hash: 6f6c63d06800a1c718ade95c2d87595c5fa3a4ac585bd3e299e8be8798d69bcb
                                            • Instruction Fuzzy Hash: EDA10570E05218CFEB24CF69D884BADBBF2FB89304F1091A9D849A7651DB749D84CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c1eca13ac203441365be5908aa48120d408658b9b011ab58719704bd704fc510
                                            • Instruction ID: 154c86ed4f7ec71328c251fb4b8dd958341f833a8a8c66688988d39d8b1dc769
                                            • Opcode Fuzzy Hash: c1eca13ac203441365be5908aa48120d408658b9b011ab58719704bd704fc510
                                            • Instruction Fuzzy Hash: 43913974E05208CFDB14DFAAD848BADBBF2FB89300F109469D419A7294DB74AE85CF45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8c02c855cd509b64476137d6321096c027a9ccad85bd0fc6bfaa941fe8394d4f
                                            • Instruction ID: 6a49637be46a86c99b9f2bb18496e9b0ab9565363b64b58ec05afbc40e0b53f8
                                            • Opcode Fuzzy Hash: 8c02c855cd509b64476137d6321096c027a9ccad85bd0fc6bfaa941fe8394d4f
                                            • Instruction Fuzzy Hash: 9A910974E01208CFDB14DFA9D948BADBBF2FB89300F109469D419A7294DB74AE85CF45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 683b09f71c78577cd025dc1b3fac7c5554592a306455748fd5887211e9cdef93
                                            • Instruction ID: 931630d639f04460327bafba6cd572dd7a3e4fede8d039e1d29041afeab6d08a
                                            • Opcode Fuzzy Hash: 683b09f71c78577cd025dc1b3fac7c5554592a306455748fd5887211e9cdef93
                                            • Instruction Fuzzy Hash: 50A11B70E01218CFEB24CF69D884BDDBBF2FB89304F1491A9D849A7651D7749985CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 04a657dcdfffc08bcac5bc5574f1386a6caf0f9f0637272afea2b27c4cd1d73f
                                            • Instruction ID: aa2dbea956166a037e148a87821e2be0667affcd7f7fa280c611f963b945fe1f
                                            • Opcode Fuzzy Hash: 04a657dcdfffc08bcac5bc5574f1386a6caf0f9f0637272afea2b27c4cd1d73f
                                            • Instruction Fuzzy Hash: 3EA13A70E01218CFEB24CF69D884BEDBBF2FB89304F1491A9D849A7651DB749984CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d4038be091956f7fb8f5f7c6d51e262dedc1d9970c9e3a716bad8639484e635a
                                            • Instruction ID: 78226c88b51e0923151bd560587b39befe99fcdad661cfcfb5f154701759c52f
                                            • Opcode Fuzzy Hash: d4038be091956f7fb8f5f7c6d51e262dedc1d9970c9e3a716bad8639484e635a
                                            • Instruction Fuzzy Hash: E0A11870E01218CFEB24CF69D884BADBBF2FB89304F1091A9D849A7651DB749D84CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ea7d40ab1762c3cb0d793136bdb3a880c39ccba937da934005c1f51b883c7d10
                                            • Instruction ID: 6c56210a31a82c7eba5e106b87c3590ce12eda1a76dde9d03e9142d0c4c2d673
                                            • Opcode Fuzzy Hash: ea7d40ab1762c3cb0d793136bdb3a880c39ccba937da934005c1f51b883c7d10
                                            • Instruction Fuzzy Hash: D8814C74E04248CFDB14CFA9D448BAEBBF6FB89704F109869D109A7284CB749D85CF94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145219860.0000000005E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E10000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e10000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 10281dd280e16c80a4e80d018bee145e24829ef1186669484d26e9ddae9dbaa0
                                            • Instruction ID: 318c813eed986c214f4fe1989d574f786dc668a6148a69af300751f131063c23
                                            • Opcode Fuzzy Hash: 10281dd280e16c80a4e80d018bee145e24829ef1186669484d26e9ddae9dbaa0
                                            • Instruction Fuzzy Hash: FA910670E05218CFEB24CF69D884BADBBF2FB89304F1091A9D849A7651DB749984CF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e34576cddc3593b35e23bc9d5f3ef6e98c1fcf9e508d4e9f00c42c7650da65b5
                                            • Instruction ID: 269f1cbe4a16de4fe0966e48cc606f4d45bd325b1bb9a4f41cd648914e741853
                                            • Opcode Fuzzy Hash: e34576cddc3593b35e23bc9d5f3ef6e98c1fcf9e508d4e9f00c42c7650da65b5
                                            • Instruction Fuzzy Hash: 72812A74E44248CFDB18DFAAD488BAEBBF2FB89704F109869D119A7244CB749D81CF54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 97b5c84b1f9bbc33f34f76ded989e7a8a2de40f1894bfe573d09358a170ec3cd
                                            • Instruction ID: 824ed4b660704525061624a4a83092dddf205384eb0b046bbaeccd7f8832bdce
                                            • Opcode Fuzzy Hash: 97b5c84b1f9bbc33f34f76ded989e7a8a2de40f1894bfe573d09358a170ec3cd
                                            • Instruction Fuzzy Hash: 5B714974E04248CFDB14CFA9D488BAEBBF2FB89704F109469D109A7284CB749D85CF94
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8fac4acc45999d71776a28bec6c40958bed335ef6456fc2ce3bbf4f7ff6ee04e
                                            • Instruction ID: de93d11cd477b234a0fcc09dc640890473eb5c5044425759cbf4fc8524f62794
                                            • Opcode Fuzzy Hash: 8fac4acc45999d71776a28bec6c40958bed335ef6456fc2ce3bbf4f7ff6ee04e
                                            • Instruction Fuzzy Hash: 61611270E85208CFEB94CF9AE444BEEBBF6FB89344F14E029D106A7240D7749989CB55
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b711b8c0e08c106cc6006e2f4121c975ef230c7c670435ca2d6be59b6d1df797
                                            • Instruction ID: 1eea3f876eca754ddc6f270a34d6846fe08e3164bad8d7f3be75d51fe256e525
                                            • Opcode Fuzzy Hash: b711b8c0e08c106cc6006e2f4121c975ef230c7c670435ca2d6be59b6d1df797
                                            • Instruction Fuzzy Hash: 835158B0E05209DFDF08CFAAE8497EDBBF6FB89301F149469D409A7284D7749A85CB44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2efc85c33a5bf81bc3a4c5e0f6d8ccef52597045cde6c79ae117b9c64a9fa65d
                                            • Instruction ID: 855d9834658134db5ca821241df03ff372265cf6f529179a4c7637f969e3148f
                                            • Opcode Fuzzy Hash: 2efc85c33a5bf81bc3a4c5e0f6d8ccef52597045cde6c79ae117b9c64a9fa65d
                                            • Instruction Fuzzy Hash: DA5126B0E05209DFDF08CFAAE4597EDBBF6FB89301F149429D40AA7244D7749985CB44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2a2e383471140d02ebe6b277ecc0f54e343ebd89a393b5c062ceb0dbd81e3e01
                                            • Instruction ID: a12740fcb6000a866aad1ec6a5bbacb4a5ad8180e357fb7f8f9c89aef09ebd4e
                                            • Opcode Fuzzy Hash: 2a2e383471140d02ebe6b277ecc0f54e343ebd89a393b5c062ceb0dbd81e3e01
                                            • Instruction Fuzzy Hash: 0C415775E016198BDB18CFABD94069EFBF3BFC8200F14C06AD958AB214EB7459468B54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144840675.0000000005CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cc0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 25590adebbffb643a9df4d4ea6cd47f59fd95ccb478bf8d0bbb9d3ee8ee8323f
                                            • Instruction ID: c541a8664eb559b96aee73a201852ebe4065dd462fe303064be2fb23d8e37792
                                            • Opcode Fuzzy Hash: 25590adebbffb643a9df4d4ea6cd47f59fd95ccb478bf8d0bbb9d3ee8ee8323f
                                            • Instruction Fuzzy Hash: 295183B1D056588FE72DCF278D452CAFAF3AFC9300F18C1FA954CA6255EA740A858F50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144840675.0000000005CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cc0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7ba5c0ddbbebc20e0fc30d9bc0e2171ba7b979936a86f8432d0511b2e3ae1907
                                            • Instruction ID: f8ccb8a58857bea70e1619f407ac8bbeabe0d1bda03c42394280b632a5233633
                                            • Opcode Fuzzy Hash: 7ba5c0ddbbebc20e0fc30d9bc0e2171ba7b979936a86f8432d0511b2e3ae1907
                                            • Instruction Fuzzy Hash: CB513E71E056588BEB2CCF2B8D456CAFAF3AFC9301F14C5FA955CA6254EB700A858E41
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144840675.0000000005CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05CC0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5cc0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7fe96903df7b5cc3cb962f2f9a8dee0c7de8344dd574fb4c649421788189ca07
                                            • Instruction ID: a78165e7a86fb0862770582abd9717d7173fa6fd7a95cd50e2a4aa32c5ba595a
                                            • Opcode Fuzzy Hash: 7fe96903df7b5cc3cb962f2f9a8dee0c7de8344dd574fb4c649421788189ca07
                                            • Instruction Fuzzy Hash: 4941FEB0D043889FDB10CFA9D984BAEBFF1BB49314F209429E41ABB250D7749984CF45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 252c008190090a742809c173d8c0279c27ff5752a6604c1ca0cbfd36a38c8beb
                                            • Instruction ID: c1360126912007c9f3e97a7210ad385cb1f5b69cae35a3743f7215534282d17b
                                            • Opcode Fuzzy Hash: 252c008190090a742809c173d8c0279c27ff5752a6604c1ca0cbfd36a38c8beb
                                            • Instruction Fuzzy Hash: 6C418375D05A548FE71CCF6B8C4569EFBF3AFC9201F14C0B68448AA269EB3005468F01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145258056.0000000005E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5e20000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 90786665353dc250bf1f51ac8708dc9872ee3c8e00e721dc10d2063a9914224b
                                            • Instruction ID: 66a29249b59b5e5fb9eeae40134e591fc4f46be4da5e8b2d66278ece61dcc297
                                            • Opcode Fuzzy Hash: 90786665353dc250bf1f51ac8708dc9872ee3c8e00e721dc10d2063a9914224b
                                            • Instruction Fuzzy Hash: C7415371E05A588BE71CCF6B8D4069EFAF7BFC9301F14D1B6844CAA259EB7045868F01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6149c26e164c0148719831c4df15d97a902cd43206e4fed7bd69c7d6a74a258d
                                            • Instruction ID: 546ba0adcfbea25da695d257cbae77a34aeb6fe8a532bc6e928615d8e5edb1d3
                                            • Opcode Fuzzy Hash: 6149c26e164c0148719831c4df15d97a902cd43206e4fed7bd69c7d6a74a258d
                                            • Instruction Fuzzy Hash: 9E415871D016188BEB68CF6BCD4978EFBF6BF88304F14C5AAD408A6254DB750A858F00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145951501.00000000060A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060A0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_60a0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a7774eb96eb77b8db29dc5e89379ba7bb0dcb2623f0d43acc27ae4de049804bb
                                            • Instruction ID: c93600905a6b2f57bf627f6cd8ee2be1c01b2e45bc97b39ef079be2f58373553
                                            • Opcode Fuzzy Hash: a7774eb96eb77b8db29dc5e89379ba7bb0dcb2623f0d43acc27ae4de049804bb
                                            • Instruction Fuzzy Hash: FA313E71D057948FE729CF66C85429ABBF6AF89304F05C4EAD448AA265EB300A85CF11
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 562bab086d9381a07832f292634dd6e5e9d4e5fd565cba0ce4a1c8a072ea89d5
                                            • Instruction ID: 8232138dc5b2ca3a73faf4213feada4e99a30b0ee50c4bab399ab50732daa2ff
                                            • Opcode Fuzzy Hash: 562bab086d9381a07832f292634dd6e5e9d4e5fd565cba0ce4a1c8a072ea89d5
                                            • Instruction Fuzzy Hash: CE21EFB5D042189FDB10CFA9D981ADEFBF1BB49320F14A01AE845B7210C775A901CFA5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e9f1357cb426922de45bed6ff8db3f7ba5cfbb29c9ea3c317e38183dbbeb42a5
                                            • Instruction ID: 9409e2f182f408db508baec7b9d57f35fe148bf549738aad8570358d86af504f
                                            • Opcode Fuzzy Hash: e9f1357cb426922de45bed6ff8db3f7ba5cfbb29c9ea3c317e38183dbbeb42a5
                                            • Instruction Fuzzy Hash: 6A21A6B5D016188BDB18CF6BC9446DDFBF7AFC9300F18C1AA9849A7254DB705A85CF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c9c556233c00b75d27e732753c80662b0367095e90d6070ad61aa48a045b0fb1
                                            • Instruction ID: 0a8d4907ffaadbdbbf0f7b3495a399d18b16642893dd97fc6c1969d38180682a
                                            • Opcode Fuzzy Hash: c9c556233c00b75d27e732753c80662b0367095e90d6070ad61aa48a045b0fb1
                                            • Instruction Fuzzy Hash: 0321C0B1D056588BEB19CFABC94879DFAF7AF88300F14C06AD409A6264DB740A858F44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2128525481.00000000030D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_30d0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 008df978a81cb97c8e86c5e6f69dc3a16acdfa7a908bc1d95be70136136b2716
                                            • Instruction ID: 9b4d72cf8a467c53d3872b658d8b4b2d5251b5472b16af9a057875aa73e44856
                                            • Opcode Fuzzy Hash: 008df978a81cb97c8e86c5e6f69dc3a16acdfa7a908bc1d95be70136136b2716
                                            • Instruction Fuzzy Hash: A03135B1D016588BEB68CF6BC94578EFBF2BFC8304F14C1A9D408A6265DB7509868F00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2145456852.0000000005EA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EA0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5ea0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 828ed0a548ef1f1b9403503b8efd36756f91e19bb3c02fb8e79f01f2cb54b503
                                            • Instruction ID: c230e12880da64d6c6f24b9fc6c8a7c73c9678d60c995995c1f9707ef43007ad
                                            • Opcode Fuzzy Hash: 828ed0a548ef1f1b9403503b8efd36756f91e19bb3c02fb8e79f01f2cb54b503
                                            • Instruction Fuzzy Hash: FE21EDB9D042189FDB10CFA9D981AEEFBF1BB49320F10A01AE805B7210C775A901CFA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144632015.0000000005C90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C90000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5c90000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a0344272508501f643b34fc6da564fb90b4543568e78376d56c6ad6340ca72c4
                                            • Instruction ID: 6bc7092fcb870ba1c46d74c6ff2d53749e77fe2ec922facb8674d097d783fff9
                                            • Opcode Fuzzy Hash: a0344272508501f643b34fc6da564fb90b4543568e78376d56c6ad6340ca72c4
                                            • Instruction Fuzzy Hash: 8F2103B1E016189BEB18CFABC9497DEFAF7BFC8300F14C16AD409A6264DB7409468F50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 12ccb1a093fff45a9aff8717d59a72b775645fc049b6c15b1e8dda3360fd706d
                                            • Instruction ID: 962699435a879c26b292a6ef64fbe5d2734bbb33be518d8e6d7e23a2ab45a12d
                                            • Opcode Fuzzy Hash: 12ccb1a093fff45a9aff8717d59a72b775645fc049b6c15b1e8dda3360fd706d
                                            • Instruction Fuzzy Hash: E011ADB1E016188BEB1CCF5BD9442DDFAF3AFC9300F18C4BA9849A6254EB705A55CF44
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2144244515.0000000005BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_5be0000_3e18bdf74f3caef770a7edcf748bdaf0e6a4a21664e69.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: '$($*$;
                                            • API String ID: 0-2693990484
                                            • Opcode ID: 1e6d17d94fb35d1d2b63c6058b6d7c321c4d56a6dd421ea86c167fef53a302bf
                                            • Instruction ID: 0e91d8273f83a237ecb8ea41a1f3658c25dddea9fe8195a09629f048c13277f5
                                            • Opcode Fuzzy Hash: 1e6d17d94fb35d1d2b63c6058b6d7c321c4d56a6dd421ea86c167fef53a302bf
                                            • Instruction Fuzzy Hash: EA21C3B4914218DFDF50CF98E884FADBBB2FB09314F448095E90AA7291C774AD85CF55

                                            Execution Graph

                                            Execution Coverage:7.8%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:69
                                            Total number of Limit Nodes:5
                                            execution_graph 14157 1047c80 14158 1047cc6 14157->14158 14162 1047e50 14158->14162 14167 1047e60 14158->14167 14159 1047db3 14163 1047e2a 14162->14163 14164 1047e5a 14162->14164 14163->14159 14170 104785c 14164->14170 14168 104785c DuplicateHandle 14167->14168 14169 1047e8e 14168->14169 14169->14159 14171 1047ec8 DuplicateHandle 14170->14171 14172 1047e8e 14171->14172 14172->14159 14173 10429c8 14174 1042a0c SetWindowsHookExW 14173->14174 14176 1042a52 14174->14176 14177 1042848 14178 1042857 14177->14178 14179 1042862 14178->14179 14183 1046b68 14178->14183 14187 1046bfb 14178->14187 14193 1046b78 14178->14193 14184 1046b87 14183->14184 14197 104631c 14184->14197 14189 1046c02 14187->14189 14190 1046b5c 14187->14190 14188 1046bd1 14188->14179 14189->14179 14190->14188 14191 104631c 2 API calls 14190->14191 14192 1046ba8 14191->14192 14192->14179 14194 1046b87 14193->14194 14195 104631c 2 API calls 14194->14195 14196 1046ba8 14195->14196 14196->14179 14199 1046321 14197->14199 14201 1047a9c 14199->14201 14200 104852e 14202 1047aa7 14201->14202 14203 1049054 14202->14203 14205 104a8e0 14202->14205 14203->14200 14206 104a901 14205->14206 14207 104a925 14206->14207 14209 104aa90 14206->14209 14207->14203 14211 104aa9d 14209->14211 14210 104aad6 14210->14207 14211->14210 14213 1048cd4 14211->14213 14214 1048cdf 14213->14214 14216 104ab48 14214->14216 14217 1048d08 14214->14217 14216->14216 14218 1048d13 14217->14218 14221 1048d18 14218->14221 14220 104abb7 14220->14216 14222 1048d23 14221->14222 14227 104bb5c 14222->14227 14224 104c138 14224->14220 14225 104a8e0 2 API calls 14225->14224 14226 104bf10 14226->14224 14226->14225 14228 104bb67 14227->14228 14231 104d350 14228->14231 14234 104d368 14228->14234 14238 104d378 14228->14238 14229 104d31a 14229->14231 14242 1048e2c 14229->14242 14231->14226 14235 104d378 14234->14235 14236 104d3c6 KiUserCallbackDispatcher 14235->14236 14237 104d3f0 14235->14237 14236->14237 14237->14229 14239 104d3bb 14238->14239 14240 104d3c6 KiUserCallbackDispatcher 14239->14240 14241 104d3f0 14239->14241 14240->14241 14241->14229 14243 1048ea8 14242->14243 14244 1048e2f 14242->14244 14243->14244 14245 104a8e0 KiUserCallbackDispatcher KiUserCallbackDispatcher 14243->14245 14244->14231 14245->14244

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 134 104785c-1047f5c DuplicateHandle 136 1047f65-1047f82 134->136 137 1047f5e-1047f64 134->137 137->136
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,01047E8E,?,?,?,?,?), ref: 01047F4F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4587598925.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1040000_MSBuild.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 5698d74a692d6330ae3d70b5cd583ac06a9c65b4f381370fe33612a2fcb0997a
                                            • Instruction ID: 5cbd7913393f8249dfc1f2268f1eff90c8e8632887f15bcc9ce4b8578ebeda52
                                            • Opcode Fuzzy Hash: 5698d74a692d6330ae3d70b5cd583ac06a9c65b4f381370fe33612a2fcb0997a
                                            • Instruction Fuzzy Hash: 6121E6B5900209EFDB10CF9AD984ADEBFF8FB48310F14842AE958A3350D374A950CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 140 1047ec0-1047f5c DuplicateHandle 141 1047f65-1047f82 140->141 142 1047f5e-1047f64 140->142 142->141
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,01047E8E,?,?,?,?,?), ref: 01047F4F
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4587598925.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1040000_MSBuild.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: 1431f4f1394171c39cd5f4aeee93945f4cee53304109875678ab7a656a08b8bb
                                            • Instruction ID: 0a7b62e54d98a0814aa29335d59077015f3070b28c406057c17bd0101372e0a6
                                            • Opcode Fuzzy Hash: 1431f4f1394171c39cd5f4aeee93945f4cee53304109875678ab7a656a08b8bb
                                            • Instruction Fuzzy Hash: 9721E3B5900249DFDB10CFAAD984AEEBFF5FB48310F14841AE918A3310D378A950CFA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 145 10429c8-1042a12 147 1042a14 145->147 148 1042a1e-1042a50 SetWindowsHookExW 145->148 151 1042a1c 147->151 149 1042a52-1042a58 148->149 150 1042a59-1042a7e 148->150 149->150 151->148
                                            APIs
                                            • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 01042A43
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4587598925.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1040000_MSBuild.jbxd
                                            Similarity
                                            • API ID: HookWindows
                                            • String ID:
                                            • API String ID: 2559412058-0
                                            • Opcode ID: dadb4e5b37247fd8ec598de2c8c5837d12981d5ce131f1e2ffac46f4243978ac
                                            • Instruction ID: 6218b1d01ccc734653e066bc3a181b9afa5842c38239640d71a21e87a55b11dc
                                            • Opcode Fuzzy Hash: dadb4e5b37247fd8ec598de2c8c5837d12981d5ce131f1e2ffac46f4243978ac
                                            • Instruction Fuzzy Hash: 1D2127B1D002499FDB14DF9AD844BEEFBF5BF88320F108429E559A7250CB74A950CFA1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 155 10429c2-1042a12 157 1042a14 155->157 158 1042a1e-1042a50 SetWindowsHookExW 155->158 161 1042a1c 157->161 159 1042a52-1042a58 158->159 160 1042a59-1042a7e 158->160 159->160 161->158
                                            APIs
                                            • SetWindowsHookExW.USER32(?,00000000,?,?), ref: 01042A43
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4587598925.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1040000_MSBuild.jbxd
                                            Similarity
                                            • API ID: HookWindows
                                            • String ID:
                                            • API String ID: 2559412058-0
                                            • Opcode ID: b3490358fa3b1dcbf6e2cd027d044995eb5b7dfe32e4cf4197b1fd1bd00d862b
                                            • Instruction ID: a2231d50201d0cc82a4780d892c024d649b333220570e27bdd866ea96db14604
                                            • Opcode Fuzzy Hash: b3490358fa3b1dcbf6e2cd027d044995eb5b7dfe32e4cf4197b1fd1bd00d862b
                                            • Instruction Fuzzy Hash: 582147B5D002098FDB14CF9AD944BEEFBF5BF88310F10842AE519A7250C774A940CFA0

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 165 104d368-104d3c4 168 104d3c6-104d3ee KiUserCallbackDispatcher 165->168 169 104d412-104d42b 165->169 170 104d3f7-104d40b 168->170 171 104d3f0-104d3f6 168->171 170->169 171->170
                                            APIs
                                            • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 0104D3DD
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4587598925.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1040000_MSBuild.jbxd
                                            Similarity
                                            • API ID: CallbackDispatcherUser
                                            • String ID:
                                            • API String ID: 2492992576-0
                                            • Opcode ID: e9a0dde3e971da19e38876882cd100b776f8ff0592baf36a1fd6581640d456be
                                            • Instruction ID: 8e41279647446ce2c7d2eb004240bcbd315012555d6afd4f361e92f62d91c39e
                                            • Opcode Fuzzy Hash: e9a0dde3e971da19e38876882cd100b776f8ff0592baf36a1fd6581640d456be
                                            • Instruction Fuzzy Hash: 2E11AFB58013998FEB10CF99C5467EEBFF8EB14310F148059E595A3741C778A644CFA5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 173 104d378-104d3c4 175 104d3c6-104d3ee KiUserCallbackDispatcher 173->175 176 104d412-104d42b 173->176 177 104d3f7-104d40b 175->177 178 104d3f0-104d3f6 175->178 177->176 178->177
                                            APIs
                                            • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 0104D3DD
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4587598925.0000000001040000.00000040.00000800.00020000.00000000.sdmp, Offset: 01040000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_1040000_MSBuild.jbxd
                                            Similarity
                                            • API ID: CallbackDispatcherUser
                                            • String ID:
                                            • API String ID: 2492992576-0
                                            • Opcode ID: 503444090c982f9978008fb48e8d973ef03d3a1e669189dcbca7e39691fb033d
                                            • Instruction ID: cf1534d8e00f014652d8033f89bbdfe3d1e95239e6a99f534aa0f388d56dccea
                                            • Opcode Fuzzy Hash: 503444090c982f9978008fb48e8d973ef03d3a1e669189dcbca7e39691fb033d
                                            • Instruction Fuzzy Hash: 0211BBB1801389CFEB10CF99C4457EEBFF8EB18310F108069E599A3682C7786644CFA1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4585677868.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_fed000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a12e392f11047a36c6ea83f75f1bf8bb73f393e4106b6d100fbc6d77fa2263bd
                                            • Instruction ID: 01a8db4abc4633e2babf99cfa2290e7cf47ad54529161858d88a151b821887de
                                            • Opcode Fuzzy Hash: a12e392f11047a36c6ea83f75f1bf8bb73f393e4106b6d100fbc6d77fa2263bd
                                            • Instruction Fuzzy Hash: 802148B2500284DFCB04DF11D9C0F26BF61FBA4324F20C169E9090B696C336E856DAA2
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4585677868.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_fed000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1b3972b63168b209257260f02a17fa06bbcd4137e165ed3560d3523e695c85cf
                                            • Instruction ID: 8b3d052dcdf72bb525d648562edd42a836d003452535628394a7ca977f350a71
                                            • Opcode Fuzzy Hash: 1b3972b63168b209257260f02a17fa06bbcd4137e165ed3560d3523e695c85cf
                                            • Instruction Fuzzy Hash: 6F214872904384DFDB05DF05D9C0B26BF61FB94328F24C56DD90A0B656C336D815DBA2
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4587293021.0000000000FFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_ffd000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 154dbf6b49b2a7e9fb1671e8a808cb322b44d47192e23c7c1346a6af018bfc91
                                            • Instruction ID: 8c1d960203e7a0b98240ff9733363a3ed5780f967f0dc5cfed564987460d17e7
                                            • Opcode Fuzzy Hash: 154dbf6b49b2a7e9fb1671e8a808cb322b44d47192e23c7c1346a6af018bfc91
                                            • Instruction Fuzzy Hash: 91212976504208EFEB05DF14D9C0B36BB66FF84324F20C56DDA094B262C777D846DA61
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4587293021.0000000000FFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_ffd000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 54e82ffa7ac73055da7d9c6086458267b2887c9062a9919af7e89ad49fea00dd
                                            • Instruction ID: e8e78fba77db98fe9fe382dfb862b22b1a6d00bdf20ff9a85d3651e0b4e8ff64
                                            • Opcode Fuzzy Hash: 54e82ffa7ac73055da7d9c6086458267b2887c9062a9919af7e89ad49fea00dd
                                            • Instruction Fuzzy Hash: 7521F572504308DFDB14DF14D5C0B26BB66EF84324F20C56DDA094B369CB76D846DA61
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4587293021.0000000000FFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_ffd000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3bf195dbfb48bc9639ddf5bf44335896073f168ba5fa51d3e63a940bc2919283
                                            • Instruction ID: cf7ef88f8036a87d148fdedba76bb92c4c47af36c6d51d3db390629ea12f086f
                                            • Opcode Fuzzy Hash: 3bf195dbfb48bc9639ddf5bf44335896073f168ba5fa51d3e63a940bc2919283
                                            • Instruction Fuzzy Hash: B9216F755093C48FCB12CF20C990715BF71AF46314F29C5EAD9498B6A7C33A984ACB62
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4585677868.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_fed000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                            • Instruction ID: 4e532b8dd8b53c1bf2034969a7d3a29c77a1af5e319fefa73234aabc5e23689e
                                            • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                            • Instruction Fuzzy Hash: F611E6B6904284CFCB16CF10D5C4B16BF71FB94324F24C5A9D8490B656C33AE856DBA1
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4585677868.0000000000FED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FED000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_fed000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                            • Instruction ID: 71ef9a724e723b8fc0000ced9bcb080e2edd7e613ab796028da2c3fa44f0da59
                                            • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                            • Instruction Fuzzy Hash: C711D3B6904384CFCB16CF14D5C4B16BF71FB94324F28C5A9D9090B666C33AD856DBA2
                                            Memory Dump Source
                                            • Source File: 00000002.00000002.4587293021.0000000000FFD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FFD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_2_2_ffd000_MSBuild.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                            • Instruction ID: f5be20754d8d42917ac0bfafc1bf2de80585cc45ba0cbee7cc3a366f093487c8
                                            • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                            • Instruction Fuzzy Hash: 1111D075904288CFEB05CF10D9C4B25BB72FF44328F24C6A9DD094B266C33AD84ACB51

                                            Execution Graph

                                            Execution Coverage:11.2%
                                            Dynamic/Decrypted Code Coverage:95.6%
                                            Signature Coverage:0%
                                            Total number of Nodes:137
                                            Total number of Limit Nodes:4
                                            execution_graph 69060 620be40 69061 620be89 NtResumeThread 69060->69061 69063 620bee0 69061->69063 69064 17ed01c 69065 17ed034 69064->69065 69066 17ed08f 69065->69066 69068 5f3dd18 69065->69068 69069 5f3dd71 69068->69069 69072 5f3e278 69069->69072 69070 5f3dda6 69073 5f3e2a5 69072->69073 69074 5f3d190 VirtualProtect 69073->69074 69076 5f3e43b 69073->69076 69075 5f3e42c 69074->69075 69075->69070 69076->69070 68897 620b1a8 68898 620b1f1 Wow64SetThreadContext 68897->68898 68900 620b269 68898->68900 68901 6088290 68902 608829a 68901->68902 68906 5f0ba78 68902->68906 68911 5f0ba88 68902->68911 68903 60882d8 68907 5f0ba88 68906->68907 68910 5f0bab3 68907->68910 68916 5f0be55 68907->68916 68921 5f0bd40 68907->68921 68910->68903 68912 5f0ba9d 68911->68912 68913 5f0bab3 68912->68913 68914 5f0bd40 4 API calls 68912->68914 68915 5f0be55 4 API calls 68912->68915 68913->68903 68914->68913 68915->68913 68917 5f0be5b 68916->68917 68926 5f0d401 68917->68926 68931 5f0d408 68917->68931 68918 5f0bb25 68922 5f0bb25 68921->68922 68923 5f0bd48 68921->68923 68923->68922 68924 5f0d401 4 API calls 68923->68924 68925 5f0d408 4 API calls 68923->68925 68924->68922 68925->68922 68927 5f0d408 68926->68927 68936 5f0d692 68927->68936 68941 5f0d61b 68927->68941 68928 5f0d43f 68928->68918 68932 5f0d41d 68931->68932 68934 5f0d692 4 API calls 68932->68934 68935 5f0d61b 4 API calls 68932->68935 68933 5f0d43f 68933->68918 68934->68933 68935->68933 68937 5f0d695 68936->68937 68938 5f0d636 68936->68938 68937->68928 68938->68936 68949 5f0dc20 68938->68949 68954 5f0dc10 68938->68954 68942 5f0d621 68941->68942 68944 5f0d636 68942->68944 68947 5f0dc20 4 API calls 68942->68947 68948 5f0dc10 4 API calls 68942->68948 68943 5f0d695 68943->68928 68944->68943 68945 5f0dc20 4 API calls 68944->68945 68946 5f0dc10 4 API calls 68944->68946 68945->68944 68946->68944 68947->68944 68948->68944 68950 5f0dc35 68949->68950 68959 5f0e2fd 68950->68959 68964 5f0e210 68950->68964 68951 5f0dc57 68951->68938 68955 5f0dc35 68954->68955 68957 5f0e210 4 API calls 68955->68957 68958 5f0e2fd 2 API calls 68955->68958 68956 5f0dc57 68956->68938 68957->68956 68958->68956 68960 5f0e30c 68959->68960 68968 620aa48 68960->68968 68972 620aa40 68960->68972 68961 5f0e0ed 68961->68951 68965 5f0e228 68964->68965 68976 5f0f970 68965->68976 68966 5f0e0ed 68966->68951 68969 620aa94 WriteProcessMemory 68968->68969 68971 620ab2d 68969->68971 68971->68961 68973 620aa48 WriteProcessMemory 68972->68973 68975 620ab2d 68973->68975 68975->68961 68977 5f0f987 68976->68977 68978 5f0f9a9 68977->68978 68982 6200244 68977->68982 68987 620030a 68977->68987 68992 6200498 68977->68992 68978->68966 68983 6200253 68982->68983 68997 6209888 68983->68997 69001 620987c 68983->69001 68984 6200096 68988 6200314 68987->68988 69006 6209d10 68988->69006 69010 6209d20 68988->69010 68989 6200096 68993 6200330 68992->68993 68994 6200096 68992->68994 68995 6209d20 2 API calls 68993->68995 68996 6209d10 2 API calls 68993->68996 68995->68994 68996->68994 68999 6209908 CreateProcessA 68997->68999 69000 6209b04 68999->69000 69002 620985e 69001->69002 69003 6209886 CreateProcessA 69001->69003 69002->68984 69005 6209b04 69003->69005 69007 6209d20 69006->69007 69008 6209d4b 69007->69008 69014 620a067 69007->69014 69008->68989 69011 6209d35 69010->69011 69012 6209d4b 69011->69012 69013 620a067 2 API calls 69011->69013 69012->68989 69013->69012 69015 620a076 69014->69015 69017 620aa40 WriteProcessMemory 69015->69017 69018 620aa48 WriteProcessMemory 69015->69018 69016 6209f23 69017->69016 69018->69016 69019 6208d38 69020 6208d87 NtProtectVirtualMemory 69019->69020 69022 6208dff 69020->69022 69027 620b7f8 69028 620b83c VirtualAllocEx 69027->69028 69030 620b8b4 69028->69030 69031 1b165e8 69032 1b16605 69031->69032 69033 1b16615 69032->69033 69038 5f311c5 69032->69038 69042 5f32ab4 69032->69042 69045 5f3a964 69032->69045 69049 5f30217 69032->69049 69039 5f311e4 69038->69039 69052 5f3d190 69039->69052 69044 5f3d190 VirtualProtect 69042->69044 69043 5f301d5 69044->69043 69046 5f3a983 69045->69046 69048 5f3d190 VirtualProtect 69046->69048 69047 5f301d5 69048->69047 69051 5f3d190 VirtualProtect 69049->69051 69050 5f301d5 69051->69050 69054 5f3d1b7 69052->69054 69056 5f3d690 69054->69056 69057 5f3d6d9 VirtualProtect 69056->69057 69059 5f31208 69057->69059 69023 5f3e7c8 69024 5f3e80c VirtualAlloc 69023->69024 69026 5f3e879 69024->69026
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: d
                                            • API String ID: 0-2564639436
                                            • Opcode ID: f27238993105197f776abb896fef23f4b32e631eca28a3bed52140b884d11379
                                            • Instruction ID: e767c0ea6f85b1bc62d31251fa718f9bb70a62eae612ac99a030e3998d978320
                                            • Opcode Fuzzy Hash: f27238993105197f776abb896fef23f4b32e631eca28a3bed52140b884d11379
                                            • Instruction Fuzzy Hash: EED178B4B00612DFCB15DF28C48496EB7F2FF88310B558969D45A9B3A5DB38F846CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 082d97a4f208f796882fa34f3fe86231e4a47545564a9d62d9231931e285e423
                                            • Instruction ID: fc826ced27f13b78cac50581b2171dc6ab99fdcf186b034084b9cfab7d6f36cb
                                            • Opcode Fuzzy Hash: 082d97a4f208f796882fa34f3fe86231e4a47545564a9d62d9231931e285e423
                                            • Instruction Fuzzy Hash: 9D5209B5A002288FDB64DF69C985B9DBBF2BB88300F1540E9E549EB351DA349D80CF61
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 74cabaefad28fcfeb9af59da5a74530058d43a112473528a963761fb9f804b05
                                            • Instruction ID: 1068f655902fb30a53f35efd476c7bcecb892e0b85d28c84b1c96e6d3f14a405
                                            • Opcode Fuzzy Hash: 74cabaefad28fcfeb9af59da5a74530058d43a112473528a963761fb9f804b05
                                            • Instruction Fuzzy Hash: 37421875A00229DFCB15DF64C884E9DBBB2FF89310F1185A9E549AB261DB31ED85CF80
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d46122c68cb5e8121543d4dceea825538f197673d50190a4725dd1b2c20529c5
                                            • Instruction ID: d538b72dcd3f5b76a2e31e77f7be5101f6c22066dc67358e5a2aa46ee942e69f
                                            • Opcode Fuzzy Hash: d46122c68cb5e8121543d4dceea825538f197673d50190a4725dd1b2c20529c5
                                            • Instruction Fuzzy Hash: 65227C76A002159FDB04DFA9D494A6DBBF6FF88300F158069E906EB395CB75ED40CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5b546e0e96890c998da5b3fdcce7d557ce18e382074d15b27833a4adf17e8f6a
                                            • Instruction ID: fe5764d26e9fe7f42c4773ea238d475a98e5d551e596c5291aa10bd9d7d0e115
                                            • Opcode Fuzzy Hash: 5b546e0e96890c998da5b3fdcce7d557ce18e382074d15b27833a4adf17e8f6a
                                            • Instruction Fuzzy Hash: 97120674B002298FCB14EF64C994AADBBB2BF89300F5085A8D54AAB355DF74ED85CF40
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c36e16293019e40c8181f2db15031a32f74193d53f563318ffd0e67566d47a87
                                            • Instruction ID: cd831b29b5fa28f3de242124729750844c883a4dec0819f0437080d016aaddb5
                                            • Opcode Fuzzy Hash: c36e16293019e40c8181f2db15031a32f74193d53f563318ffd0e67566d47a87
                                            • Instruction Fuzzy Hash: 1EE1D1B1B092168FDB14AF29C85566EBBF7FF94210F244029E586CB3A5DE38CD40CB52
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 544b9739aec474b0a01ba50ee273c83df303c56f5f6ad49e8bac1270cfd2128d
                                            • Instruction ID: a7e258d431b96663a35091564cee09ca4921f7d65a5d69041c15e6c4eac41463
                                            • Opcode Fuzzy Hash: 544b9739aec474b0a01ba50ee273c83df303c56f5f6ad49e8bac1270cfd2128d
                                            • Instruction Fuzzy Hash: 92D14A72A00115DFDB09CFA4C844E99BBB2FF88310F0544A8E609AB272DB76ED55DF91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ecc7df49c3517cabe065eacf1118b6aee1b0bb2bf611677975e2d42679f7dead
                                            • Instruction ID: 13de6d34b48289a121a0ca96ac894e4462a019c75b8135441a2e45f93392aa67
                                            • Opcode Fuzzy Hash: ecc7df49c3517cabe065eacf1118b6aee1b0bb2bf611677975e2d42679f7dead
                                            • Instruction Fuzzy Hash: 4BE13F74A00219DFCB04EF64D5949ADBBB2FFC8310F508569E546AB365DF34AC82CB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c43f970a9580778565736a7eed69d3845a26608b5d633fdfad713adbd2f578d6
                                            • Instruction ID: 9fa3d5ef960c726846cf7d919c7d95473876f2d8248e4ec3ec1036e6d82473ff
                                            • Opcode Fuzzy Hash: c43f970a9580778565736a7eed69d3845a26608b5d633fdfad713adbd2f578d6
                                            • Instruction Fuzzy Hash: 20C180B5A001288FDB14DBA9C995BDDBBF6FF88300F158099E509AB391CE749D81CF61
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 590b476c1392b34f1cff1c10d0973392365aba935abb28d8925a7fd8de8164e6
                                            • Instruction ID: e799f541a225c25e46c3771b77b0ef638222516f3b7702971c2e7d8aa586c65d
                                            • Opcode Fuzzy Hash: 590b476c1392b34f1cff1c10d0973392365aba935abb28d8925a7fd8de8164e6
                                            • Instruction Fuzzy Hash: A4A1EA74A10128DFCB04EFA4D899AADBBB2FF88310F518159E446AB365DF74AC46CB41
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a39a3700566567c2712532d452611f9b5f43fa898a9a2875d7b5c308094adee2
                                            • Instruction ID: 25e01bb5988238dd76b64aa5155c4b1b269e732f861447690f5ea2c72ea7e3cd
                                            • Opcode Fuzzy Hash: a39a3700566567c2712532d452611f9b5f43fa898a9a2875d7b5c308094adee2
                                            • Instruction Fuzzy Hash: 68813E74B10214CFCB04DF68D898AAEBBB6FF88610F148069E446DB3A5CB74DC42CB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8ccf7cf86b7d98712cb782a3a5bed22300c93949f97994b07eeb5e1d30902f25
                                            • Instruction ID: b852c9b2f58a5cc045b3dc78a68d01db391a9b84b8a753cf6b1bced2ef4a3af7
                                            • Opcode Fuzzy Hash: 8ccf7cf86b7d98712cb782a3a5bed22300c93949f97994b07eeb5e1d30902f25
                                            • Instruction Fuzzy Hash: C2812879A00628CFCB14DF68C484AADBBF5FF88310B1581A9E8169B361DB35ED41CF90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4642981d448ab65a297379937cf1cc0e436ea7d55dae82c1d6e1f5f070192f9d
                                            • Instruction ID: 8ec30505bf1ea1f55f3f5f43d9ed58af969937237aff2449e6a4130fc480b335
                                            • Opcode Fuzzy Hash: 4642981d448ab65a297379937cf1cc0e436ea7d55dae82c1d6e1f5f070192f9d
                                            • Instruction Fuzzy Hash: 775189317006158FDB18AF29D844BAE3BA2FFC4754F108129E8069B3A4DF79DC06CB95
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 09f9efc0d26d800623bfb2620376913e64c9794909204638f9a4377837ec1f42
                                            • Instruction ID: ef823cb5d50e39def28c338dc322e5cf1e0e5da6960613f1dc2c5bd4706bd624
                                            • Opcode Fuzzy Hash: 09f9efc0d26d800623bfb2620376913e64c9794909204638f9a4377837ec1f42
                                            • Instruction Fuzzy Hash: E4610974B10614DFCB04DF68C898AAEB7B6BF88710F548169E446EB365CB74EC42CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1f7f122fead42a5966b3f521d554314fdbe7bfd07fc407cef29e258efd095523
                                            • Instruction ID: e81f52449f3537cea294a970572ab918fe6daf0e6963e73cbcc1fe4b855d0f58
                                            • Opcode Fuzzy Hash: 1f7f122fead42a5966b3f521d554314fdbe7bfd07fc407cef29e258efd095523
                                            • Instruction Fuzzy Hash: DE415D767042049FCB059F68D818E597FB6FF89720B1580AAE205DB772CB36D812DB51
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 476394ee03c6661952130ea56ea82f3e16efbab61992eab908a7ff5adbcfc677
                                            • Instruction ID: 9cd17f5a7aeadc4db2524d6ff4e6b2c95b42759cef9df3782964e9aef6c2a937
                                            • Opcode Fuzzy Hash: 476394ee03c6661952130ea56ea82f3e16efbab61992eab908a7ff5adbcfc677
                                            • Instruction Fuzzy Hash: 45414070B106248FCB14EB64C8A8A7EB7B7BFC8700F50851DD446AB394CF789C468B91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0bb10e0b0b95165b0c13d41dc27a0cea0eb35883f53f9f5370bf1ff404ac0af3
                                            • Instruction ID: 2f24969607df843987dec6ab3b4a4be6f146097d0fb5f53cb3926aeed5058599
                                            • Opcode Fuzzy Hash: 0bb10e0b0b95165b0c13d41dc27a0cea0eb35883f53f9f5370bf1ff404ac0af3
                                            • Instruction Fuzzy Hash: 0A41F071A043458FCB05DF78C840AAEBFB6FFC9200F04892DD1499B296DFB5A9058BA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 532d45fccb6df439ba488c77ff245e5e5137d8c4ce66d19aeff21c6aba990645
                                            • Instruction ID: 0447067f3a5c945533436923b73ce25a77fbb5ab741b01535b6e2b09fc79905b
                                            • Opcode Fuzzy Hash: 532d45fccb6df439ba488c77ff245e5e5137d8c4ce66d19aeff21c6aba990645
                                            • Instruction Fuzzy Hash: E84199B1A047159FCB20CF69C948A6EBBF2BF88300F188919E586D7A51DB34F906CF51
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 40791e87e86529478c26bf861801b84a6ed1917ca501a7cf60fac82dd12ea477
                                            • Instruction ID: 76d113abf15691d919a2f48dc48ec9717beabcdbf4a00eaa79f6a003eb2a2c94
                                            • Opcode Fuzzy Hash: 40791e87e86529478c26bf861801b84a6ed1917ca501a7cf60fac82dd12ea477
                                            • Instruction Fuzzy Hash: A4414C757046109FD308DB79C869F2A7BA6AFC8704F104469E246CB3A6DE75EC42C791
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7d5339527f42d9fa9dae7116be7781a42d0dc6008b4afd7115e98fa5a7cd6339
                                            • Instruction ID: e2944826c219ff99485dabb2a0897e29e993c8f87948e04417ccdddf299448ae
                                            • Opcode Fuzzy Hash: 7d5339527f42d9fa9dae7116be7781a42d0dc6008b4afd7115e98fa5a7cd6339
                                            • Instruction Fuzzy Hash: 60311C717006149FD308DB69C859F2A7BA6ABCC714F104468E60A8B3A6DE75EC42CB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c8d0f5921c4c9f984916ae6756c19e0f1f1582115ba47e9f25d57d86031349f4
                                            • Instruction ID: 4d1826ee0b6f1ac878d403a4e22b464993a98305cf8337e4eeebd05c2e8be326
                                            • Opcode Fuzzy Hash: c8d0f5921c4c9f984916ae6756c19e0f1f1582115ba47e9f25d57d86031349f4
                                            • Instruction Fuzzy Hash: 3D311876A00514DFCB04CF58D888EA9BBB2FF48320B0680A8F6099B372C731ED51CB41
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0549cbebdc0a5511017b7b87c9f6478110cd24b65c708375e652b8dfbe307fe2
                                            • Instruction ID: 0a2dd51842ac72600f77a4e40dda4040637a97d6961e18a3454687493aea4563
                                            • Opcode Fuzzy Hash: 0549cbebdc0a5511017b7b87c9f6478110cd24b65c708375e652b8dfbe307fe2
                                            • Instruction Fuzzy Hash: A1313B71A04119DBDB14DBA4D964AEEBBB6FF88310F108069E942B7394DB759D01CFA0
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 1263922f7104b8efe84baffd023cbd1392e8f6b7000ffea1fddb78d86e471e54
                                            • Instruction ID: 867c711d8786c4ce744a399d87e2c79454ee092d5b280339f37ef8d9e1b42fef
                                            • Opcode Fuzzy Hash: 1263922f7104b8efe84baffd023cbd1392e8f6b7000ffea1fddb78d86e471e54
                                            • Instruction Fuzzy Hash: FD317C36B001149FCF049FA5C849E59BFB6EF88310F0540A9EA869B366DE76DC028B50
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e665ff294745ae55d1cfd249a6e5859d7a3a6e4acd2516abecc991d2de50bc72
                                            • Instruction ID: 6594f1a023c541de79941846fad61920058e0ffd51a9509b05746a342ca6ffc1
                                            • Opcode Fuzzy Hash: e665ff294745ae55d1cfd249a6e5859d7a3a6e4acd2516abecc991d2de50bc72
                                            • Instruction Fuzzy Hash: 9F21D3323042109FDB208A6EE984A66BBE5EFC0721B19857EE54EC7642DF35FC42C790
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d3baa32ddc29bc22695baaa5ce84372b705cec51b4e62a2e1362061c6a2b9623
                                            • Instruction ID: 2c024b3d658523308d889f71738ca6deece6dd2245cd223cc7ddc625b9d903b4
                                            • Opcode Fuzzy Hash: d3baa32ddc29bc22695baaa5ce84372b705cec51b4e62a2e1362061c6a2b9623
                                            • Instruction Fuzzy Hash: AD31AB71A44259CFCB05DFA4C991ADD7BF2FF49300F6005AAD481AB3A2CB399D45CBA0
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3f108bf205a66b0c8759f3b118a7b95b8a31baac989bc0d9a9646e9083074a52
                                            • Instruction ID: 7c74a1f2833edf5599aa3ee680835d1908da088f1e45c20f22a1bb196072ca3e
                                            • Opcode Fuzzy Hash: 3f108bf205a66b0c8759f3b118a7b95b8a31baac989bc0d9a9646e9083074a52
                                            • Instruction Fuzzy Hash: 06218B74F10619CFCB00EF68C55496EB7B5FF89700B504569D5069B324EF34A946CB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e469d1c074a61328de73aa3a397d0c66cabf10a7c378c8115603022bbf647947
                                            • Instruction ID: 6c39a6bab0cf662d78a9b0872f21bcb989248c3f5a6b3b2e15612fa97be953da
                                            • Opcode Fuzzy Hash: e469d1c074a61328de73aa3a397d0c66cabf10a7c378c8115603022bbf647947
                                            • Instruction Fuzzy Hash: 58216D76A10214DFCB05CF99D989E99BBB2FF48320B0640A9F2059B372D736ED15DB40
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6442933f99c79e64b1883f6bce389f6457bde87fa2e090f41316e2a6e2efd9ce
                                            • Instruction ID: d4f5fb0c2e4ec943d084cbc45d4ba519989acee06a45e7279fb92c248688b95e
                                            • Opcode Fuzzy Hash: 6442933f99c79e64b1883f6bce389f6457bde87fa2e090f41316e2a6e2efd9ce
                                            • Instruction Fuzzy Hash: EC21A774F00A19CFCB04EF68C5549AEBBB5FF89201F50456AD5059B360EB34AA46CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cc7faa9ecbb63a09ad6cf5a03a47e360ef2f9625357121c1bb66e2ed7a17858c
                                            • Instruction ID: cbe32ac1cd709a10ce094f73cabc2d576d36d5a40d9cfe5ea8936640161d7db8
                                            • Opcode Fuzzy Hash: cc7faa9ecbb63a09ad6cf5a03a47e360ef2f9625357121c1bb66e2ed7a17858c
                                            • Instruction Fuzzy Hash: 1A0180717141204BCB14AE2AE8D8D7AB7ABFFD4664354803AE546CF32ACE35CC01CB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d87a3be07c8540def4564715f8f95ac122ec18a3d09a74c9dca9dc3887990604
                                            • Instruction ID: 04abba55bfd677ada84052c93c11518409123cd7055ac5ab059af1be87e31bf2
                                            • Opcode Fuzzy Hash: d87a3be07c8540def4564715f8f95ac122ec18a3d09a74c9dca9dc3887990604
                                            • Instruction Fuzzy Hash: BE11E774B00919CFCB00EF68C4846ADB7B6FF89300F504269D5029B760DF39A947CB51
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 563109e50e370e152c576b133842a69ec4cce146dc5aea3e91017874962a8556
                                            • Instruction ID: a8906ee0c8a2f4e8306a40f8f85781988782d1291d0ade457167870c2e5c68e9
                                            • Opcode Fuzzy Hash: 563109e50e370e152c576b133842a69ec4cce146dc5aea3e91017874962a8556
                                            • Instruction Fuzzy Hash: F601F5717001149FCB14DB28DC95B9EBBF6EB89300F1041A9D148D7351CE35AD458B90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ce25b4a2d757fac21661053ce9c73020028015c1fd7342d48cdc291d3c0b3197
                                            • Instruction ID: bb19b43885d33c19858f5156ac5c82d02014ecd70a0fd9ead4d05269c746d41b
                                            • Opcode Fuzzy Hash: ce25b4a2d757fac21661053ce9c73020028015c1fd7342d48cdc291d3c0b3197
                                            • Instruction Fuzzy Hash: 7D018F353009109FC3049B25D459B5A7BA2EBCC715B104128E98ACB755DF35ED42CBD1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ff8db126725cfb12a9e892023999a388adbfbf35b48ffe9a838b0fde9e6a5674
                                            • Instruction ID: c994548c2a87b02c89685222f89d09b5133d0f9772ef96585d8f460f80379e66
                                            • Opcode Fuzzy Hash: ff8db126725cfb12a9e892023999a388adbfbf35b48ffe9a838b0fde9e6a5674
                                            • Instruction Fuzzy Hash: 1C013C35300A109FC309AB25D458A1ABBE2FBCC715B108128FA4ACB765CF75EC52CBE1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3af2c269ad58d1b44a02505860585cbd4354766bae728b68dc58b861d99418a1
                                            • Instruction ID: c5034a0b586d31f0d3375fccfea3ab4869c797c8da815a78d05cd511ccb5449c
                                            • Opcode Fuzzy Hash: 3af2c269ad58d1b44a02505860585cbd4354766bae728b68dc58b861d99418a1
                                            • Instruction Fuzzy Hash: BBF04F353102009FC7149A69D859F2A7BB6EBC8710F144169F985CB7A0CE71EC428B94
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f3cba847dc8e17f88a389cacfc491defb635068a7f389275d5e210e484d60a5f
                                            • Instruction ID: c447ef2c3fee53bc40e6ccc973e60d277f08512e78975788c468ee7fcad39dbe
                                            • Opcode Fuzzy Hash: f3cba847dc8e17f88a389cacfc491defb635068a7f389275d5e210e484d60a5f
                                            • Instruction Fuzzy Hash: 67F05E353102009FC704DB69D858E3AB7ABEFC8721B1080A9F946CB3A1CE71EC02CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ea6d4c42dc322a4909034336611232d53d59b6ba47d9cffc72db663458cdd0a6
                                            • Instruction ID: 5361932c46f138533090619e9f752d7805bb45286d0938ee55d1d2d47cd47f0e
                                            • Opcode Fuzzy Hash: ea6d4c42dc322a4909034336611232d53d59b6ba47d9cffc72db663458cdd0a6
                                            • Instruction Fuzzy Hash: 53E0E53230020587C7149A1AEC86B4BBF5AEBC0224F04D63DA54DC7211DEB0AD0587D4
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3586256ece56bc94c3d82c8366b0c36b92edb0094503493bacbc5f886d27ad24
                                            • Instruction ID: b172348d7826ee92fc5a5731bc6bd6613941ea139592d727c759a4e10fbac44e
                                            • Opcode Fuzzy Hash: 3586256ece56bc94c3d82c8366b0c36b92edb0094503493bacbc5f886d27ad24
                                            • Instruction Fuzzy Hash: C9E07D73B0D03103CB20080D6C89A2BC4A9EBC5914785013EF99DD3304CD60CC0143F1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7c4faa58d42636949c92028e57227fd4beb21d2ed16b2365f186f83e1ce7588d
                                            • Instruction ID: 45f1431a7b9e735061b07f37af9b9ddf32a26ec53e688aa07ccdcaac95ad49c6
                                            • Opcode Fuzzy Hash: 7c4faa58d42636949c92028e57227fd4beb21d2ed16b2365f186f83e1ce7588d
                                            • Instruction Fuzzy Hash: A2E0123130120697C7149A1EE884D4BFF9AEFC0265711D53DE14A87515DEB4AD0587D0
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0271c0c515a947a32d132777ca6fb0254b3214b244ba2a2f37c53d3be21a9f40
                                            • Instruction ID: b46b075f1f5cd3d3a0788145019f10296f56875fa009d78b74e35de6c88b0659
                                            • Opcode Fuzzy Hash: 0271c0c515a947a32d132777ca6fb0254b3214b244ba2a2f37c53d3be21a9f40
                                            • Instruction Fuzzy Hash: B4D012321441049FCB009A9CE845F817F75EB29734F7442A0F504C7B72CA2ED913D650
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aa6a41097916d1479fe91871950352caf5becab4b40a9530f5ee2f3a5cf1dfbb
                                            • Instruction ID: 0082cffcc538b9b54fb60a4487b4dc9952a86ae76cfb690fe4bf1204f1ebd559
                                            • Opcode Fuzzy Hash: aa6a41097916d1479fe91871950352caf5becab4b40a9530f5ee2f3a5cf1dfbb
                                            • Instruction Fuzzy Hash: 4DD022730042089FC3009B38CC0AF403FB8DB06338F044290F9448B371D332EA14C680
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.2287825036.0000000005F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05F20000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_5f20000_smcdll.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                            • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                            • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                            • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94