Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
avx_Cracked.exe

Overview

General Information

Sample name:avx_Cracked.exe
Analysis ID:1442325
MD5:604f557a561320764432a9a0feab44c0
SHA1:66f3d11b2a7e5f08152db3090068ea1a5bfa7d65
SHA256:b33810de1ba7b0383c7d35006a1691a6c27480516d30bf2ec4cdd173171071a3
Tags:BlankGrabberexeThemida
Infos:

Detection

Mofksys
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected Mofksys
Found potential dummy code loops (likely to delay analysis)
Hides threads from debuggers
Machine Learning detection for sample
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality to detect virtual machines (SGDT)
Detected potential crypto function
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • avx_Cracked.exe (PID: 7152 cmdline: "C:\Users\user\Desktop\avx_Cracked.exe" MD5: 604F557A561320764432A9A0FEAB44C0)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000003.2044535691.0000000004100000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MofksysYara detected MofksysJoe Security
    00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_MofksysYara detected MofksysJoe Security
      Process Memory Space: avx_Cracked.exe PID: 7152JoeSecurity_MofksysYara detected MofksysJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.avx_Cracked.exe.400000.0.unpackJoeSecurity_MofksysYara detected MofksysJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: avx_Cracked.exeAvira: detected
          Source: avx_Cracked.exeReversingLabs: Detection: 57%
          Source: avx_Cracked.exeJoe Sandbox ML: detected
          Source: avx_Cracked.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

          Spreading

          barindex
          Source: Yara matchFile source: 0.2.avx_Cracked.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000003.2044535691.0000000004100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: avx_Cracked.exe PID: 7152, type: MEMORYSTR

          System Summary

          barindex
          Source: avx_Cracked.exeStatic PE information: section name:
          Source: avx_Cracked.exeStatic PE information: section name:
          Source: avx_Cracked.exeStatic PE information: section name:
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042805B0_2_0042805B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042606B0_2_0042606B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B0_2_0063E05B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004220000_2_00422000
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004260070_2_00426007
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042200A0_2_0042200A
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_006340280_2_00634028
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042200F0_2_0042200F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004220140_2_00422014
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004260190_2_00426019
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004220230_2_00422023
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_006380090_2_00638009
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_006420150_2_00642015
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_006160150_2_00616015
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0064601C0_2_0064601C
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004271710_2_00427171
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042B2460_2_0042B246
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004222690_2_00422269
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042527B0_2_0042527B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042221E0_2_0042221E
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042F2260_2_0042F226
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004222250_2_00422225
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004252C70_2_004252C7
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004252CC0_2_004252CC
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004252D10_2_004252D1
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063A2CA0_2_0063A2CA
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042E2F70_2_0042E2F7
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004222840_2_00422284
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004262880_2_00426288
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004222890_2_00422289
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042234C0_2_0042234C
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004223510_2_00422351
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004243590_2_00424359
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042337B0_2_0042337B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004223C40_2_004223C4
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004223CE0_2_004223CE
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004223D30_2_004223D3
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004293D30_2_004293D3
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004253F80_2_004253F8
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004254430_2_00425443
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004254480_2_00425448
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004254520_2_00425452
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004284520_2_00428452
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004254570_2_00425457
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042545C0_2_0042545C
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004254610_2_00425461
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004264220_2_00426422
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004264270_2_00426427
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004264310_2_00426431
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004284350_2_00428435
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004254EA0_2_004254EA
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042457F0_2_0042457F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042A5020_2_0042A502
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042951C0_2_0042951C
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004295310_2_00429531
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004245890_2_00424589
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004306430_2_00430643
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004306550_2_00430655
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0043065A0_2_0043065A
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0043065F0_2_0043065F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004306640_2_00430664
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004306690_2_00430669
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0043066E0_2_0043066E
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004306730_2_00430673
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004296CB0_2_004296CB
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004306CD0_2_004306CD
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004296D00_2_004296D0
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004286E60_2_004286E6
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004246BA0_2_004246BA
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004246BF0_2_004246BF
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004306BE0_2_004306BE
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004307400_2_00430740
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042475F0_2_0042475F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0043075E0_2_0043075E
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004307630_2_00430763
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004247690_2_00424769
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004307680_2_00430768
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042476E0_2_0042476E
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0043076D0_2_0043076D
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004307720_2_00430772
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004247780_2_00424778
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042477D0_2_0042477D
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042B7CF0_2_0042B7CF
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0043078B0_2_0043078B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004307900_2_00430790
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042A7AB0_2_0042A7AB
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042A7BA0_2_0042A7BA
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004228540_2_00422854
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004308760_2_00430876
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004228750_2_00422875
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0043087B0_2_0043087B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042F8300_2_0042F830
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004278C90_2_004278C9
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004308F80_2_004308F8
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004308800_2_00430880
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004308850_2_00430885
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0043088A0_2_0043088A
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0043088F0_2_0043088F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004308990_2_00430899
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0043089E0_2_0043089E
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004308A30_2_004308A3
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004268A00_2_004268A0
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004228AC0_2_004228AC
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004238B30_2_004238B3
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004308BC0_2_004308BC
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004249520_2_00424952
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004309020_2_00430902
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0043092F0_2_0043092F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004259F90_2_004259F9
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004309840_2_00430984
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_004309890_2_00430989
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A440_2_00425A44
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A4E0_2_00425A4E
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430A6F0_2_00430A6F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430A740_2_00430A74
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430A790_2_00430A79
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430A7E0_2_00430A7E
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A0D0_2_00425A0D
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A120_2_00425A12
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A170_2_00425A17
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A210_2_00425A21
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A260_2_00425A26
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A2B0_2_00425A2B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A300_2_00425A30
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A350_2_00425A35
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A3A0_2_00425A3A
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425AC10_2_00425AC1
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00611AEB0_2_00611AEB
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0060BACB0_2_0060BACB
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430A830_2_00430A83
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A850_2_00425A85
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A8F0_2_00425A8F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430A8D0_2_00430A8D
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0060DAAF0_2_0060DAAF
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00428A8D0_2_00428A8D
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430A920_2_00430A92
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430A970_2_00430A97
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A940_2_00425A94
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A990_2_00425A99
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425A9E0_2_00425A9E
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430A9C0_2_00430A9C
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425AA30_2_00425AA3
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430AA10_2_00430AA1
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430AA60_2_00430AA6
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425AAD0_2_00425AAD
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425AB20_2_00425AB2
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430AB00_2_00430AB0
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430AB50_2_00430AB5
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425ABC0_2_00425ABC
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042DB7A0_2_0042DB7A
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430B0A0_2_00430B0A
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00429B320_2_00429B32
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425B870_2_00425B87
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00605BA70_2_00605BA7
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042DB850_2_0042DB85
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_005EDB860_2_005EDB86
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425B980_2_00425B98
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042FBBE0_2_0042FBBE
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00609C670_2_00609C67
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00412C100_2_00412C10
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042CCC20_2_0042CCC2
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00426CC00_2_00426CC0
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00424CC70_2_00424CC7
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425CC40_2_00425CC4
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425CC90_2_00425CC9
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00426CC90_2_00426CC9
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425CCE0_2_00425CCE
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00426CCE0_2_00426CCE
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00424CD20_2_00424CD2
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425CE30_2_00425CE3
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00422CF70_2_00422CF7
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00427CF80_2_00427CF8
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00422CFC0_2_00422CFC
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430C950_2_00430C95
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425CBF0_2_00425CBF
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425D460_2_00425D46
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425D4B0_2_00425D4B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00422D010_2_00422D01
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00422D0B0_2_00422D0B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423DC30_2_00423DC3
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423DC80_2_00423DC8
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423DCD0_2_00423DCD
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423DD70_2_00423DD7
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423DDC0_2_00423DDC
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423D9F0_2_00423D9F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423DBE0_2_00423DBE
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425DBC0_2_00425DBC
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_005E3E440_2_005E3E44
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423E5E0_2_00423E5E
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423E630_2_00423E63
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423E6D0_2_00423E6D
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423E720_2_00423E72
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00430E0A0_2_00430E0A
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425E0E0_2_00425E0E
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423E180_2_00423E18
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042EE270_2_0042EE27
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00435EC90_2_00435EC9
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423EEB0_2_00423EEB
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042DEEE0_2_0042DEEE
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423E860_2_00423E86
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00429E8E0_2_00429E8E
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423E900_2_00423E90
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423E950_2_00423E95
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00429EBC0_2_00429EBC
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00431F7D0_2_00431F7D
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0042AF080_2_0042AF08
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00422F3B0_2_00422F3B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423FC10_2_00423FC1
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423FC60_2_00423FC6
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423FCB0_2_00423FCB
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00621FF00_2_00621FF0
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00617FF30_2_00617FF3
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063BFD00_2_0063BFD0
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0062DFD60_2_0062DFD6
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425F8B0_2_00425F8B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423F940_2_00423F94
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00425F9D0_2_00425F9D
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423FA60_2_00423FA6
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423FAD0_2_00423FAD
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00423FB70_2_00423FB7
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00625F980_2_00625F98
          Source: avx_Cracked.exeBinary or memory string: OriginalFilename vs avx_Cracked.exe
          Source: avx_Cracked.exe, 00000000.00000003.2044556388.0000000003130000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTJprojMain.exe<?xml version="1.0" encoding="UTF-8" standalone="yes"?> vs avx_Cracked.exe
          Source: avx_Cracked.exe, 00000000.00000000.1972179599.0000000000420000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTJprojMain.exe vs avx_Cracked.exe
          Source: avx_Cracked.exeBinary or memory string: OriginalFilenameTJprojMain.exe vs avx_Cracked.exe
          Source: avx_Cracked.exeBinary or memory string: OriginalFilenamedjoin.exej% vs avx_Cracked.exe
          Source: avx_Cracked.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: avx_Cracked.exe, avx_Cracked.exe, 00000000.00000003.2044535691.0000000004100000.00000004.00001000.00020000.00000000.sdmp, avx_Cracked.exe, 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: A*\AF:\RFD\xNewCode\xNewPro\xT\trjFN\Project1.vbp
          Source: classification engineClassification label: mal96.spre.evad.winEXE@1/1@0/0
          Source: C:\Users\user\Desktop\avx_Cracked.exeMutant created: NULL
          Source: C:\Users\user\Desktop\avx_Cracked.exeFile created: C:\Users\user\AppData\Local\Temp\~DF2F626955114B1B31.TMPJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: avx_Cracked.exeReversingLabs: Detection: 57%
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: msvbvm60.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeSection loaded: asycfilt.dllJump to behavior
          Source: avx_Cracked.exeStatic file information: File size 11622687 > 1048576
          Source: avx_Cracked.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x2d8000
          Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
          Source: avx_Cracked.exeStatic PE information: section name:
          Source: avx_Cracked.exeStatic PE information: section name:
          Source: avx_Cracked.exeStatic PE information: section name:
          Source: avx_Cracked.exeStatic PE information: section name: .themida
          Source: avx_Cracked.exeStatic PE information: section name: .boot
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0069406D push edx; mov dword ptr [esp], 301B8BBEh0_2_00693FE8
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_007CB072 push ebx; mov dword ptr [esp], edi0_2_007CB0E4
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00705062 push ebp; mov dword ptr [esp], ecx0_2_007050B9
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_006A5079 push esi; mov dword ptr [esp], 661593D7h0_2_006A50AD
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0071D055 push 791EA119h; mov dword ptr [esp], ebp0_2_0071D07D
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0071D055 push edx; mov dword ptr [esp], ebx0_2_0071D084
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_006E5044 push ecx; mov dword ptr [esp], ebx0_2_006E5061
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_006E5044 push eax; mov dword ptr [esp], edi0_2_006E5079
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0080D0AA push ebp; mov dword ptr [esp], 4BC5E4A1h0_2_0080D0FF
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0080D0AA push 6BF1BD9Fh; mov dword ptr [esp], ecx0_2_0080D16C
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_007AA051 push ebp; mov dword ptr [esp], ebx0_2_007AA04B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00640057 push 73405F31h; mov dword ptr [esp], eax0_2_00640079
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00640057 push edi; mov dword ptr [esp], 4780CE92h0_2_00640092
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00645052 push 20098EBFh; mov dword ptr [esp], edx0_2_0064507B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00645052 push esi; mov dword ptr [esp], 679AAD0Dh0_2_006450EB
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push 1040B19Bh; mov dword ptr [esp], edi0_2_0063E081
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push ebx; mov dword ptr [esp], 421DB3B1h0_2_0063E0F7
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push 4E0AC9D8h; mov dword ptr [esp], ebx0_2_0063E12B
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push ecx; mov dword ptr [esp], ebp0_2_0063E159
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push ebp; mov dword ptr [esp], 7EEA6082h0_2_0063E211
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push eax; mov dword ptr [esp], 00000000h0_2_0063E223
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push 76C4083Fh; mov dword ptr [esp], edx0_2_0063E289
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push 025BF787h; mov dword ptr [esp], ebp0_2_0063E29F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push eax; mov dword ptr [esp], ebp0_2_0063E2B5
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push esi; mov dword ptr [esp], 00000010h0_2_0063E310
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push 43806AB8h; mov dword ptr [esp], eax0_2_0063E377
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push ebp; mov dword ptr [esp], esi0_2_0063E464
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push 5ADBEC0Ah; mov dword ptr [esp], eax0_2_0063E47F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push edx; mov dword ptr [esp], eax0_2_0063E4DA
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push edx; mov dword ptr [esp], ecx0_2_0063E50F
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_0063E05B push edi; mov dword ptr [esp], ebp0_2_0063E528
          Source: avx_Cracked.exeStatic PE information: section name: entropy: 7.933615943763996

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\avx_Cracked.exeWindow searched: window name: RegmonClassJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeWindow searched: window name: FilemonClassJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\avx_Cracked.exeSystem information queried: FirmwareTableInformationJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeCode function: 0_2_00403A5C sgdt fword ptr [eax]0_2_00403A5C
          Source: C:\Users\user\Desktop\avx_Cracked.exeWindow / User API: threadDelayed 3183Jump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeWindow / User API: threadDelayed 6703Jump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exe TID: 7156Thread sleep count: 3183 > 30Jump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exe TID: 7156Thread sleep time: -159150s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exe TID: 7156Thread sleep count: 6703 > 30Jump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exe TID: 7156Thread sleep time: -335150s >= -30000sJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\avx_Cracked.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\avx_Cracked.exeLast function: Thread delayed
          Source: avx_Cracked.exe, 00000000.00000002.3236817423.0000000004000000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__
          Source: avx_Cracked.exe, 00000000.00000002.3236499019.0000000000D2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__#
          Source: avx_Cracked.exe, 00000000.00000002.3234669482.000000000009C000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__em00024
          Source: C:\Users\user\Desktop\avx_Cracked.exeSystem information queried: ModuleInformationJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeProcess information queried: ProcessInformationJump to behavior

          Anti Debugging

          barindex
          Source: C:\Users\user\Desktop\avx_Cracked.exeProcess Stats: CPU usage > 42% for more than 60s
          Source: C:\Users\user\Desktop\avx_Cracked.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeOpen window title or class name: regmonclass
          Source: C:\Users\user\Desktop\avx_Cracked.exeOpen window title or class name: gbdyllo
          Source: C:\Users\user\Desktop\avx_Cracked.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
          Source: C:\Users\user\Desktop\avx_Cracked.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
          Source: C:\Users\user\Desktop\avx_Cracked.exeOpen window title or class name: procmon_window_class
          Source: C:\Users\user\Desktop\avx_Cracked.exeOpen window title or class name: ollydbg
          Source: C:\Users\user\Desktop\avx_Cracked.exeOpen window title or class name: filemonclass
          Source: C:\Users\user\Desktop\avx_Cracked.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
          Source: C:\Users\user\Desktop\avx_Cracked.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeProcess queried: DebugObjectHandleJump to behavior
          Source: C:\Users\user\Desktop\avx_Cracked.exeProcess queried: DebugPortJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          1
          DLL Side-Loading
          441
          Virtualization/Sandbox Evasion
          OS Credential Dumping621
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Software Packing
          LSASS Memory441
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          DLL Side-Loading
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
          Obfuscated Files or Information
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          avx_Cracked.exe58%ReversingLabsWin32.Trojan.Barys
          avx_Cracked.exe100%AviraTR/Dropper.Gen
          avx_Cracked.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          No contacted IP infos
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1442325
          Start date and time:2024-05-16 01:07:05 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 53s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:4
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:avx_Cracked.exe
          Detection:MAL
          Classification:mal96.spre.evad.winEXE@1/1@0/0
          EGA Information:Failed
          HCA Information:Failed
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target avx_Cracked.exe, PID 7152 because it is empty
          • VT rate limit hit for: avx_Cracked.exe
          TimeTypeDescription
          01:08:42API Interceptor595502x Sleep call for process: avx_Cracked.exe modified
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\avx_Cracked.exe
          File Type:Composite Document File V2 Document, Cannot read section info
          Category:dropped
          Size (bytes):114688
          Entropy (8bit):7.609759718977058
          Encrypted:false
          SSDEEP:1536:Ka3a0GZYNOWNMTOec6ppTusdwGqF5rHWjbD8Y2dRO8uOP6hxb2/drPX5eJ:Ka3afKOWcOeNp9uJHWTSHuOCh1gX5+
          MD5:9EED317AD2FABE816102284C7B1F4C2F
          SHA1:083D9918084CD2977CCAD1643A75CC256D0D65E0
          SHA-256:4FF24F854ECEF1913C7839553BCEF20EA9F4D193406E897B5116AFD95D8151A9
          SHA-512:141A56A268BB848A316FEBC2F191E4012516AA8825FC14B4D88105C6031D33A3C8D02F0D187F57CAE15301168EC9E57AABA08AB955D85E97B82647ABA08673CE
          Malicious:false
          Reputation:low
          Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows, MZ for MS-DOS
          Entropy (8bit):7.98579369592106
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:avx_Cracked.exe
          File size:11'622'687 bytes
          MD5:604f557a561320764432a9a0feab44c0
          SHA1:66f3d11b2a7e5f08152db3090068ea1a5bfa7d65
          SHA256:b33810de1ba7b0383c7d35006a1691a6c27480516d30bf2ec4cdd173171071a3
          SHA512:7dc426154c1b0ba6116532f6f08a2058480a2d160f1d9f9db38b904161a9d91da7d3908407df0e58751d56629d248b7a9a4ed9e7b0214494233ca37490309f00
          SSDEEP:196608:IuhQ3XK2lP2vIW3pThofIdQW1BwZkurErvI9pWjgaAnajMsbSEo2rGN6nzC+dMzr:jhLqP2vdlSnkurEUWjJjIfGGNmytKjxs
          TLSH:3BC6338926650CE4E96E423F96A39817D7B3FC291394D36B0FB8B6631F535E04C38798
          File Content Preview:MZ......................................................................!..L.!This program cannot be run in DOS mode....$........t..............z.......................Rich............PE..L...f2YQ.....................0......X.J...........@................
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x8a0058
          Entrypoint Section:.boot
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          DLL Characteristics:
          Time Stamp:0x51593266 [Mon Apr 1 07:08:22 2013 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:b672bf4528e2ef8904397d0b17905606
          Instruction
          call 00007F52B0F64CF0h
          push ebx
          mov ebx, esp
          push ebx
          mov esi, dword ptr [ebx+08h]
          mov edi, dword ptr [ebx+10h]
          cld
          mov dl, 80h
          mov al, byte ptr [esi]
          inc esi
          mov byte ptr [edi], al
          inc edi
          mov ebx, 00000002h
          add dl, dl
          jne 00007F52B0F64BA7h
          mov dl, byte ptr [esi]
          inc esi
          adc dl, dl
          jnc 00007F52B0F64B8Ch
          add dl, dl
          jne 00007F52B0F64BA7h
          mov dl, byte ptr [esi]
          inc esi
          adc dl, dl
          jnc 00007F52B0F64BF3h
          xor eax, eax
          add dl, dl
          jne 00007F52B0F64BA7h
          mov dl, byte ptr [esi]
          inc esi
          adc dl, dl
          jnc 00007F52B0F64C87h
          add dl, dl
          jne 00007F52B0F64BA7h
          mov dl, byte ptr [esi]
          inc esi
          adc dl, dl
          adc eax, eax
          add dl, dl
          jne 00007F52B0F64BA7h
          mov dl, byte ptr [esi]
          inc esi
          adc dl, dl
          adc eax, eax
          add dl, dl
          jne 00007F52B0F64BA7h
          mov dl, byte ptr [esi]
          inc esi
          adc dl, dl
          adc eax, eax
          add dl, dl
          jne 00007F52B0F64BA7h
          mov dl, byte ptr [esi]
          inc esi
          adc dl, dl
          adc eax, eax
          je 00007F52B0F64BAAh
          push edi
          mov eax, eax
          sub edi, eax
          mov al, byte ptr [edi]
          pop edi
          mov byte ptr [edi], al
          inc edi
          mov ebx, 00000002h
          jmp 00007F52B0F64B3Bh
          mov eax, 00000001h
          add dl, dl
          jne 00007F52B0F64BA7h
          mov dl, byte ptr [esi]
          inc esi
          adc dl, dl
          adc eax, eax
          add dl, dl
          jne 00007F52B0F64BA7h
          mov dl, byte ptr [esi]
          inc esi
          adc dl, dl
          jc 00007F52B0F64B8Ch
          sub eax, ebx
          mov ebx, 00000001h
          jne 00007F52B0F64BCAh
          mov ecx, 00000001h
          add dl, dl
          jne 00007F52B0F64BA7h
          mov dl, byte ptr [esi]
          inc esi
          adc dl, dl
          adc ecx, ecx
          add dl, dl
          jne 00007F52B0F64BA7h
          mov dl, byte ptr [esi]
          inc esi
          adc dl, dl
          jc 00007F52B0F64B8Ch
          push esi
          mov esi, edi
          sub esi, ebp
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x1f0480x50.idata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x200000x13c4.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          0x10000x191d40x900006f1bf4b449959991cd5cad7d22f376cFalse0.9839952256944444data7.933615943763996IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          0x1b0000x180c0x1000dd004ed326c744a19e7a55f550e8a213False0.009033203125data0.019689899213607254IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          0x1d0000x13f00x10001e1a38257bbbef7590868d141ee59372False0.276611328125data2.809383557330569IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .idata0x1f0000x10000x100012bc61d64335963249b58f7839803931False0.03076171875data0.23984251009498897IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rsrc0x200000x20000x2000eb77186a112590d337e6e1776efdc349False0.1282958984375data3.042281041123453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .themida0x220000x47e0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .boot0x4a00000x2d80000x2d8000a9ab5f3e4fea48d775c4475e4e904c1cunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0x201000xca8Device independent bitmap graphic, 32 x 64 x 24, image size 30720.07901234567901234
          RT_GROUP_ICON0x20db80x14data1.1
          RT_VERSION0x20ddc0x1ecdataEnglishUnited States0.5020325203252033
          RT_MANIFEST0x20fd80x3e7XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.42542542542542544
          DLLImport
          kernel32.dllGetModuleHandleA
          MSVBVM60.DLLEVENT_SINK_GetIDsOfNames
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:01:07:49
          Start date:16/05/2024
          Path:C:\Users\user\Desktop\avx_Cracked.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\avx_Cracked.exe"
          Imagebase:0x400000
          File size:11'622'687 bytes
          MD5 hash:604F557A561320764432A9A0FEAB44C0
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_Mofksys, Description: Yara detected Mofksys, Source: 00000000.00000003.2044535691.0000000004100000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_Mofksys, Description: Yara detected Mofksys, Source: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
          Reputation:low
          Has exited:false

          Reset < >
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5a4560be0086f255d399f76bce4216b4b0c8bc06cc24a5895a5ad4d3e8521214
            • Instruction ID: 4e35476ac350516c38eaceb1bba2321f51cca77870e425bdd07a4e27384da08f
            • Opcode Fuzzy Hash: 5a4560be0086f255d399f76bce4216b4b0c8bc06cc24a5895a5ad4d3e8521214
            • Instruction Fuzzy Hash: 4DD0121060C24AFEE7B1442C4C18FF6149BA32C394F301D2B521395644D52C95C2BD7A
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: $&H68$&HA8$h#@
            • API String ID: 0-1988485601
            • Opcode ID: cd20a7d3b55ef82ee3132964682ea25cd73d0367465c479d272536d82207a749
            • Instruction ID: f198cd70f4d496bc7940f7355a5e4fe40ff025cce30350eb0c459dc764c5fff0
            • Opcode Fuzzy Hash: cd20a7d3b55ef82ee3132964682ea25cd73d0367465c479d272536d82207a749
            • Instruction Fuzzy Hash: A8130C71D002289BCB25DF65DD88BDEBBB9FB48301F1081EAE50AA6250DE745F85CF64
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: Wk~$pf${o
            • API String ID: 0-1105868048
            • Opcode ID: cb7a2c64c8c04d4558656898070cc07c29e644638143a0ca4a646efa3b42822b
            • Instruction ID: 40a25f178c24c250bb5468c2be0d8d002c7ee9b1858bd839a3e7b03374d916e5
            • Opcode Fuzzy Hash: cb7a2c64c8c04d4558656898070cc07c29e644638143a0ca4a646efa3b42822b
            • Instruction Fuzzy Hash: D9E1E6F36082049FE714AF19EC85B7ABBE9EF94310F19493DEBC487744E63598108697
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: ='oS$Z9g
            • API String ID: 0-2248029610
            • Opcode ID: 0f234d46bd1c7fb6d935c752ec6f82e4b485e7eabe2048c3ef2efa2973cf3240
            • Instruction ID: 42f282fb5a38e228e533e5a0395f4e61d76f1094b3d0a84eaa40b89195306cfb
            • Opcode Fuzzy Hash: 0f234d46bd1c7fb6d935c752ec6f82e4b485e7eabe2048c3ef2efa2973cf3240
            • Instruction Fuzzy Hash: 69E1C4F391C200AFE7056E19EC817AAB7E9EF94720F1A453DEBC483344E67598448696
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: rk{$2>?
            • API String ID: 0-109687107
            • Opcode ID: e785eacdd04891aef261821cf8d75c544459c234b42a13138f569e271c08b017
            • Instruction ID: 2931e6bfcca4dd67315f1a49b5286fce76f1da884eb38c4304e2268d10787465
            • Opcode Fuzzy Hash: e785eacdd04891aef261821cf8d75c544459c234b42a13138f569e271c08b017
            • Instruction Fuzzy Hash: DDE1D1F29082109FE704AE1DEC81B6AF7E5EF94320F1A853DEBC493344E63598108B97
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: D`E}$|y
            • API String ID: 0-2206084433
            • Opcode ID: 9178f21138f7b49fc21fd440630fc531a440b23724da8990a9090866288e1147
            • Instruction ID: 6cd432a5720b2bab9e2ee710d5e8a7fdfa704332f68698362390048e17097954
            • Opcode Fuzzy Hash: 9178f21138f7b49fc21fd440630fc531a440b23724da8990a9090866288e1147
            • Instruction Fuzzy Hash: 7F7139F3A086189FE7006E6DDC817AAB7E9EF54760F1A453DEAC4D3740E9759C0086D2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: F_,<
            • API String ID: 0-4001736281
            • Opcode ID: 9bd31bfa7c0add0c81464af8b2ee86c97d9d5ab931b470ee3da6144ad7678654
            • Instruction ID: d6a10f86fee7d265717447ace8e4daee54b5a5cfada3f5c0012e7cf8242ace07
            • Opcode Fuzzy Hash: 9bd31bfa7c0add0c81464af8b2ee86c97d9d5ab931b470ee3da6144ad7678654
            • Instruction Fuzzy Hash: 7492BDB3F116258BF3544E38CC983A27693DB95320F2F42788E496B7C5D93E6D0A9784
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: \}=
            • API String ID: 0-711213316
            • Opcode ID: 6027aa1c764f72906b08cf871232fbf5089eb0494af00cca1084de2d259154d2
            • Instruction ID: 232524365210f3478aef927d2ffccfff5ff9d79e989c22d51c1eb0b208cb9f08
            • Opcode Fuzzy Hash: 6027aa1c764f72906b08cf871232fbf5089eb0494af00cca1084de2d259154d2
            • Instruction Fuzzy Hash: 79E1F6F390C6049FE7046F19EC817AAFBE9EB94320F1A493DEAC487744E67594418687
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: Kvei
            • API String ID: 0-298406620
            • Opcode ID: 0d0324186254ca2c6160c008324c6392e60efb277499e25259f0d2893bd30430
            • Instruction ID: 24500c9ed22413136f9a29828a5c6d4d19e64461e46816c43d2b98e3094a4c5c
            • Opcode Fuzzy Hash: 0d0324186254ca2c6160c008324c6392e60efb277499e25259f0d2893bd30430
            • Instruction Fuzzy Hash: 7AE1F8B3A0C6049FE7146E19EC857AAFBE9EF94720F16053DE7C887340EA7598018797
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: y`{=
            • API String ID: 0-3943110406
            • Opcode ID: a8d5cdfa983d66df1cb5aa2f97316684c9b3356b8e8fb343d512c205946d0cb4
            • Instruction ID: 1bb6840f26e1c54087a79346c3586dc2374dbd57f46d59f8a62ea7e796948679
            • Opcode Fuzzy Hash: a8d5cdfa983d66df1cb5aa2f97316684c9b3356b8e8fb343d512c205946d0cb4
            • Instruction Fuzzy Hash: 84E1D5F360C200AFE7056E19EC85BBABBE5EF58364F19493DE6C4C7744E63598008796
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: m?o
            • API String ID: 0-4001566704
            • Opcode ID: 1315a0e861d166cf408764b92a06ab0e00a2998cd41b97c145099a03fee58a47
            • Instruction ID: c4efe1c790722caf409b6f6dcd83ad3bbd701e8d9ff3db7e74d15cd12631b76c
            • Opcode Fuzzy Hash: 1315a0e861d166cf408764b92a06ab0e00a2998cd41b97c145099a03fee58a47
            • Instruction Fuzzy Hash: 5BE1E6F3A0C204AFE3146E59EC8176AFBE5EF98720F16453DEAC487740EA7598018797
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: <:o
            • API String ID: 0-3851649581
            • Opcode ID: 1b33dcc34c1fc69115bb8eb1eedceac4455641d3d346d981ab97f4b2ff7522fc
            • Instruction ID: 459fba0b91b053d686bdebc9637e2540526f79cbdeece420e4d163a93e9a816e
            • Opcode Fuzzy Hash: 1b33dcc34c1fc69115bb8eb1eedceac4455641d3d346d981ab97f4b2ff7522fc
            • Instruction Fuzzy Hash: 27E1B6F3908210AFE7106E59EC8576ABBE9EF94720F1A493DEAC4D7740E67598008793
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: }<
            • API String ID: 0-3670023155
            • Opcode ID: 4d97b2b5d79f772ce18ecb48978027f71192bc2b8167b315d7915a54c79a8070
            • Instruction ID: e125f069c6d9040a56106863cde187396c91c37ea7b0db22c6b681056f21f3e0
            • Opcode Fuzzy Hash: 4d97b2b5d79f772ce18ecb48978027f71192bc2b8167b315d7915a54c79a8070
            • Instruction Fuzzy Hash: BDC19DB3F116258BF3444939CD583A27683EBD4314F2F82398A599B7C9ED7E9C0A5384
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: 8
            • API String ID: 0-4194326291
            • Opcode ID: 78b277016c4b5aafb938bd9909bb9e0b2849198128475ebfce6d46c72061580f
            • Instruction ID: 55403d82e4f4cb3a0e7d32d30974f37b3eaadc72d949fd03ef1c0dfd3796a347
            • Opcode Fuzzy Hash: 78b277016c4b5aafb938bd9909bb9e0b2849198128475ebfce6d46c72061580f
            • Instruction Fuzzy Hash: 4BC1AAF7F216254BF3444928CC983A22643DBD5325F2F82788B5CAB7C6D97E9D0A5384
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: f
            • API String ID: 0-1993550816
            • Opcode ID: caf64602dc284460220e9ae8eb0e40fb047621a19bfa1e8966bc96b7bb5370f8
            • Instruction ID: a5cbad02365be272270a5e6ecbc6f50af596f2c3318f0c05537d64847a37fd2d
            • Opcode Fuzzy Hash: caf64602dc284460220e9ae8eb0e40fb047621a19bfa1e8966bc96b7bb5370f8
            • Instruction Fuzzy Hash: FDC17BB3F516154BF3444939CCA93A27683DBE5314F2F82388A899B7C5DD7E9C0A5384
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: N
            • API String ID: 0-1130791706
            • Opcode ID: d4c1fff9621392dcfc7f140c965d4aa75ced278c81e0ac14c208d509ed0f86ed
            • Instruction ID: 064428badddd20d3b84db98609c024d6ddaca3a2688f696777272c2f720553e5
            • Opcode Fuzzy Hash: d4c1fff9621392dcfc7f140c965d4aa75ced278c81e0ac14c208d509ed0f86ed
            • Instruction Fuzzy Hash: 40C18CB3E1112587F3988D39CD593A27682AB94320F2F82788E9DAB7C5DD3E5D0653C4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: n&
            • API String ID: 0-2864816929
            • Opcode ID: 01bea9fae6ef0663fd3d7ebcacaecedad62af6eaab8d5c1645f79c9ae6342f57
            • Instruction ID: 61eeafb493ef63bce828008c9d4b33d9b162adb4123fbdbb4e83434db4a7e7f2
            • Opcode Fuzzy Hash: 01bea9fae6ef0663fd3d7ebcacaecedad62af6eaab8d5c1645f79c9ae6342f57
            • Instruction Fuzzy Hash: 88B16DB3F216248BF3544D39CD983626683D7D5311F2F82788A58AB7C9D87EAC0A5384
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: C
            • API String ID: 0-1037565863
            • Opcode ID: 2e2dfdf917e105a47288a18a2d002efd67f7604fb5cb82ce13ce8bb21b267de6
            • Instruction ID: 6542fb488d705a9423483ed6a9ed0832508aec620487c58f6634c466ad9c5a93
            • Opcode Fuzzy Hash: 2e2dfdf917e105a47288a18a2d002efd67f7604fb5cb82ce13ce8bb21b267de6
            • Instruction Fuzzy Hash: B3B19FB3F116258BF3584968CC593A27683DBD5320F2F82788F59ABBC5D87E5C0A5384
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: 5U|k
            • API String ID: 0-3576477182
            • Opcode ID: 4ccbb83ea66549dacdd8776d1131977f0885a0aea3d04fa57d1e31618ad0943a
            • Instruction ID: 680cdd0280ed40af40b90fe283f5d818853d31aeab7e95d51188f6cd90727832
            • Opcode Fuzzy Hash: 4ccbb83ea66549dacdd8776d1131977f0885a0aea3d04fa57d1e31618ad0943a
            • Instruction Fuzzy Hash: 6EA1BCB7F102248BF3544D39DC983627693EB95315F2F82388E48AB7C5D93E9C0A5784
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: y
            • API String ID: 0-4225443349
            • Opcode ID: 8c539d272759fba813f9f3c0ecd20842fc08255e03725f73b1926926771adf93
            • Instruction ID: 736a58007adfe8f5ba284b3da5307454ce731bd0791cc07832e6f0994282502c
            • Opcode Fuzzy Hash: 8c539d272759fba813f9f3c0ecd20842fc08255e03725f73b1926926771adf93
            • Instruction Fuzzy Hash: F5A1AEB3F205248BF3544D29CC593A27683DB94325F2F42788E8DAB7C5D93EAD0A5384
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: %
            • API String ID: 0-2567322570
            • Opcode ID: 5590ddc40762d91a1fc3ca8fb54ee73fd362b89dc8bacb0f8e2ca21704333249
            • Instruction ID: 8f6df91d149b2e1b4301321e575160e74195acfde699c3a8d46cd68768c9d8be
            • Opcode Fuzzy Hash: 5590ddc40762d91a1fc3ca8fb54ee73fd362b89dc8bacb0f8e2ca21704333249
            • Instruction Fuzzy Hash: 69A17CF3F5162147F3484939DD683626A83DBE4315F2F82388F49A77C9D87E5D0A5284
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: .
            • API String ID: 0-248832578
            • Opcode ID: f7693bc81a37062ec47abf4fcbaa594da47562ba12f8bdeac22bef5aad64e398
            • Instruction ID: 3b70c68e98b1864edcfc6b243778de9c140b4fd0ca367a78bd1673f05d66980d
            • Opcode Fuzzy Hash: f7693bc81a37062ec47abf4fcbaa594da47562ba12f8bdeac22bef5aad64e398
            • Instruction Fuzzy Hash: 25A17BB7F515258BF3884939CD583A2668397E0325F2F82388E5D6BBC9DC7E5D0A4384
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: H
            • API String ID: 0-2852464175
            • Opcode ID: fcca31e8d1de60ed088fbb905aa59d3290fc5970c013ab89e707044d769eb5d8
            • Instruction ID: 56460670b13a8123f21591503de5825ffa76675b6b7811d8af13fe201a9fc93f
            • Opcode Fuzzy Hash: fcca31e8d1de60ed088fbb905aa59d3290fc5970c013ab89e707044d769eb5d8
            • Instruction Fuzzy Hash: F6917CB3F112254BF3644979CD9836266839BD5321F2F82788E9CAB7C5DC7E5C0A5384
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: c
            • API String ID: 0-112844655
            • Opcode ID: 24c6043b8c5c4cd97c651bcfc905faf7ddf58f063d70f2c3f4cdb9079a97f43e
            • Instruction ID: 254a8d9e2cbba026c5a934718c1d2db791abe0df54556fcc9faf09085f10d297
            • Opcode Fuzzy Hash: 24c6043b8c5c4cd97c651bcfc905faf7ddf58f063d70f2c3f4cdb9079a97f43e
            • Instruction Fuzzy Hash: 50919DB3F115254BF3584928CC583B27643DBD1321F2F82788E5DABBC9E97E9D0A5284
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: \
            • API String ID: 0-2967466578
            • Opcode ID: ecfb36f93bbf6692c606ad09b5ec57749251dda8ec7b7cc4f081b0e3ce968ac8
            • Instruction ID: 279493ec7a4729f81d1892360c8d13764fc91726fd64aa7eca5825598a830df5
            • Opcode Fuzzy Hash: ecfb36f93bbf6692c606ad09b5ec57749251dda8ec7b7cc4f081b0e3ce968ac8
            • Instruction Fuzzy Hash: 8681C2B7F616254BF3544978CC983626683DBD4315F2F823C8E58ABBC9D87E9C0A5384
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: (
            • API String ID: 0-3887548279
            • Opcode ID: 05906be3798e0b37876ccc9a3a369863ec5033fbabea72b36ea7c039c17cca2b
            • Instruction ID: 72c1d4f56fc2758c0fe89a596b32217f4181d76369769b71cb583a35704c759d
            • Opcode Fuzzy Hash: 05906be3798e0b37876ccc9a3a369863ec5033fbabea72b36ea7c039c17cca2b
            • Instruction Fuzzy Hash: 5D81DEB3F116258BF3544D68CC983A27643DBD5315F2F82388E99AB7C6D93E6C099384
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: 7
            • API String ID: 0-1790921346
            • Opcode ID: eb48ddf1b52f784297939916d4e9c88202e9a4cdf9805363ee575fc41d73db3d
            • Instruction ID: 419cbecb0d726ec1509db17015d6bbaac7012822abcc0c40b4d4f1bd172ef1ac
            • Opcode Fuzzy Hash: eb48ddf1b52f784297939916d4e9c88202e9a4cdf9805363ee575fc41d73db3d
            • Instruction Fuzzy Hash: E981BCB3F606258BF3444979CC893A23683DBD5311F2F82788F589B7C9C87E9C0A5284
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: /
            • API String ID: 0-2043925204
            • Opcode ID: 53fa639037a55ec1491865c5689101d1c723be770639d95982a79f31bff8308a
            • Instruction ID: 8058e224397acbcc1c62dbee06af768e79b759a319e83c021020c433d00f0f91
            • Opcode Fuzzy Hash: 53fa639037a55ec1491865c5689101d1c723be770639d95982a79f31bff8308a
            • Instruction Fuzzy Hash: 6581BCB3E212258BF3544E68CC543A27752DBA5311F2F42788E4C6B7C5E97E6C0957C4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: 3
            • API String ID: 0-1842515611
            • Opcode ID: 94fea4f0ff2ba19d5f303826b040c8c9358c2770b2f39e5e8775c5ba5aa8522d
            • Instruction ID: 5fbeac31c25f07f77fe39fbcf01015ca45905b48de3ddc20f7e13ddbad534846
            • Opcode Fuzzy Hash: 94fea4f0ff2ba19d5f303826b040c8c9358c2770b2f39e5e8775c5ba5aa8522d
            • Instruction Fuzzy Hash: 87815DB3F112258BF3544E29CC94362B293EBD5325F2F82388E596B7C5E93E5C0A5784
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: tML
            • API String ID: 0-970961158
            • Opcode ID: 39188a1d9e5c0a5ce1047f93a73aab72a388a302a01745619fc1c4774e04326d
            • Instruction ID: 89eb8d8238b1c19283d3dbe6cff3a0183619cc4bb1b4ef86282c3fa418b35cc1
            • Opcode Fuzzy Hash: 39188a1d9e5c0a5ce1047f93a73aab72a388a302a01745619fc1c4774e04326d
            • Instruction Fuzzy Hash: 7681BEB3F216258BF3544928DC983627683DBD5321F3F42388E686B7C5E87E5D095384
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: A
            • API String ID: 0-3554254475
            • Opcode ID: 70eb4cf4d1ba9271c0cf11a894b09d9501d473a6c50070904f9a46bb00b5fbf1
            • Instruction ID: 60ade29d31c6f00f338f33a09a79fccdd535fca196a9ac8b0e71ce169f6bad1c
            • Opcode Fuzzy Hash: 70eb4cf4d1ba9271c0cf11a894b09d9501d473a6c50070904f9a46bb00b5fbf1
            • Instruction Fuzzy Hash: C461A0B7F1062687F3544D28CC983A27792EB95314F2F4238CE59AB7C5D93E9D0A5388
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: VK/
            • API String ID: 0-4214421731
            • Opcode ID: 781f810f70c70b908baf2a65e35aad1d8fd322a7a1fc735b00e9e147bf8def76
            • Instruction ID: 73c50da3e2d3afbc7ed885b80f31a3699dfc597162df5e774692b2a9607053e9
            • Opcode Fuzzy Hash: 781f810f70c70b908baf2a65e35aad1d8fd322a7a1fc735b00e9e147bf8def76
            • Instruction Fuzzy Hash: 2B611873F115258BF3504E29CC583A2B653ABD5320F2F81788E8C6B7C5D97E6D0A9784
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: v
            • API String ID: 0-1801730948
            • Opcode ID: 319b1fe0b36b1436c0c1b0fd9b01415625179b8af4b89a53d369f09bc129f430
            • Instruction ID: 6669c8b54c62cca1b5a2ce6b3788a71417cb636e878403fbcbf3020425acfbc1
            • Opcode Fuzzy Hash: 319b1fe0b36b1436c0c1b0fd9b01415625179b8af4b89a53d369f09bc129f430
            • Instruction Fuzzy Hash: 43617EB3F115248BF7484928CC583667692DBA5321F2F82788E49ABBC9D87E5C0953C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 594f221c56f12e581321296eb4a486813e58d24b9904aa7adc81b3700877599a
            • Instruction ID: 8ca0098e9e07e2383aff7471f3148292b93e1ab9fae12f99c11dee067d5fcdd0
            • Opcode Fuzzy Hash: 594f221c56f12e581321296eb4a486813e58d24b9904aa7adc81b3700877599a
            • Instruction Fuzzy Hash: 9DF1D4F36087049FE314AE5DEC857BAB7D9EF94710F1A493DEAC483740EA35A9008697
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d9f29111e812650ae934ac8c4a6c9f9a2d3cc23ea99a5cf47061e78ef1429451
            • Instruction ID: 9e209d5a01d567ed758a7b928a4cd405902f3350af5c44bca6472a1711923f07
            • Opcode Fuzzy Hash: d9f29111e812650ae934ac8c4a6c9f9a2d3cc23ea99a5cf47061e78ef1429451
            • Instruction Fuzzy Hash: 11E1D6F3608210AFE7006E5DEC817AABBE9EF94760F1A453DEAC487744E635984087D7
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 681e864a53c313b1f5ed7914e6fab47fd926601834e6116fb72e4cb3720b7cad
            • Instruction ID: 3f665722b8feb80ceb427ae9bdd8cbdeb1d382bdd4a30c709cf95b0a03b5352e
            • Opcode Fuzzy Hash: 681e864a53c313b1f5ed7914e6fab47fd926601834e6116fb72e4cb3720b7cad
            • Instruction Fuzzy Hash: 21E1A2F3A0C610AFE7046E58EC8177ABBE9EB58320F19453DEAC9D7740E67598008796
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5cb8a40edb4ecd30a9a8ac3e49fd6a50d1d1580cca8975fb8f8e93ad293209c6
            • Instruction ID: dd4fe51f16c6a738901cfdf297be638988a80c740534ce31d3a590cc5641ffee
            • Opcode Fuzzy Hash: 5cb8a40edb4ecd30a9a8ac3e49fd6a50d1d1580cca8975fb8f8e93ad293209c6
            • Instruction Fuzzy Hash: 00D1D7B3608314AFE7046F19EC817BAFBE9EF94720F1A453DEAC497740E67558008796
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 21242223f10a0fb73790a97c2d7cd15cb23bbe52ffcb20e6dfa1a96d26f7f3e5
            • Instruction ID: fc0dfafecbbae56ae1fd1b8595d2b4e5bfa61b3799c331307e75de0b8d1c1197
            • Opcode Fuzzy Hash: 21242223f10a0fb73790a97c2d7cd15cb23bbe52ffcb20e6dfa1a96d26f7f3e5
            • Instruction Fuzzy Hash: 61D1C3F360C204AFE3116E59EC85B6ABBE9EF54720F1A493DE7C4C7740E67698008796
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 26a0d886bbf77409309039051ca462d1ec12daed03761984809b61d3d83bcb08
            • Instruction ID: 12b34442f359c7706acf58db2f30c52baf3bd76577f1d995b3ba7b6b36a5e823
            • Opcode Fuzzy Hash: 26a0d886bbf77409309039051ca462d1ec12daed03761984809b61d3d83bcb08
            • Instruction Fuzzy Hash: EDD1C5F360C610AFE705AF19EC8177ABBE9EF84320F16853DEAC4C7744E63558418A96
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: df8a1e93aedd5c4bb3a908a70c9734657323056c577035b9089544bbc713e4ec
            • Instruction ID: 831b884ef33bdcf14fd167db02db448be5a1a171e3ee60965ba7cfb56857ec12
            • Opcode Fuzzy Hash: df8a1e93aedd5c4bb3a908a70c9734657323056c577035b9089544bbc713e4ec
            • Instruction Fuzzy Hash: 08C1D6F260C204AFE714AE19EC857BABBE5EF58310F0A493DEAC4C7744E63598508797
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0a5c31909591f88c02139d09f86ca52b443183a5982a0dd9ee6cd42b4f144ffa
            • Instruction ID: 0e165ddded99e2bb5947453f311e4a64149b5c4ce54b46b22949b091af04a44a
            • Opcode Fuzzy Hash: 0a5c31909591f88c02139d09f86ca52b443183a5982a0dd9ee6cd42b4f144ffa
            • Instruction Fuzzy Hash: 12D18AB3E106354BF3584968CD983A26682DB95320F2F42788F6DBB7C1D8BE5D0A53C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c37475135895f41c830ac7df4e73304098c3763f780d5c0a8cf80d16580096aa
            • Instruction ID: 24ad38bf2ed75b537043eb9c2291253bacdc10ecf993236399c310ffdc7faf83
            • Opcode Fuzzy Hash: c37475135895f41c830ac7df4e73304098c3763f780d5c0a8cf80d16580096aa
            • Instruction Fuzzy Hash: 0BC150B3F216254BF3444969CC983A27683DBD4321F2F82788E5CAB7C5D97E9C4A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2ef5af3b6e150e7454388dacdda57b79d648dc194ecd4bcbe42f14e94d738665
            • Instruction ID: 1f00b13d37140345438014cbab44b6946f1891129489bc2bcdd4d6fcbec2a1ef
            • Opcode Fuzzy Hash: 2ef5af3b6e150e7454388dacdda57b79d648dc194ecd4bcbe42f14e94d738665
            • Instruction Fuzzy Hash: 75C16BB7F112258BF3504939CC5876276839BD5320F2F82388A98AB7C5DD7E9D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5603d52ec867458273453548aa9857b59c2c6210c176671fb806a1abec976b08
            • Instruction ID: 81dd3b9df2384e0b16c85b6500e23789595325f14dcf863fea955e0b18863d41
            • Opcode Fuzzy Hash: 5603d52ec867458273453548aa9857b59c2c6210c176671fb806a1abec976b08
            • Instruction Fuzzy Hash: 7DC1BEB3F212258BF3544978CC583A276829B95320F2F82788F5CAB7C5D97E9D0A53C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a255f29b9debf5a5285610407de77104ef2807106a63378b226367aea9ee957c
            • Instruction ID: 6885bb2d7a5833ac70c71e1fe61955a391492b8798e8433027dcca8403bd8d5f
            • Opcode Fuzzy Hash: a255f29b9debf5a5285610407de77104ef2807106a63378b226367aea9ee957c
            • Instruction Fuzzy Hash: 51C17EB3F215254BF3544D39CC883A26683DB95321F2F86788E5CABBC5D87E9D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ec6022919cf0f11a3706d18ce3ad2227a366381bca3b58a9d5ec5855257176b0
            • Instruction ID: 8658b68f60242606e902d8a71171a0fefe1ebb1c4248c8ceca3ed8a88390e276
            • Opcode Fuzzy Hash: ec6022919cf0f11a3706d18ce3ad2227a366381bca3b58a9d5ec5855257176b0
            • Instruction Fuzzy Hash: FFC158F3E1163547F36449B8CC98362A6929BA4325F2F82788F5C7B7C5D97E5C0A42C8
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3c7a45042c2acab50784c9eaa48815a266bd36bde1ceffeb1438b4a2f7be1493
            • Instruction ID: 891996579ed71b9ef7d1762e5d46e0ed569bcb70a38017e7180356ae69ba35c4
            • Opcode Fuzzy Hash: 3c7a45042c2acab50784c9eaa48815a266bd36bde1ceffeb1438b4a2f7be1493
            • Instruction Fuzzy Hash: ACC190F7F502254BF3540939DD983626683D7A5325F2F42388F58AB7C6D97E9C0A4384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a59907f46ce48a0ef5ca49b8de77d041f9cc616add07928054b977c8bbe93ddf
            • Instruction ID: eab414fc7dce7b19a1bc214f908d43449d652673ee1c6b4d460506b846f4f309
            • Opcode Fuzzy Hash: a59907f46ce48a0ef5ca49b8de77d041f9cc616add07928054b977c8bbe93ddf
            • Instruction Fuzzy Hash: 34B1ACB3F516258BF3544979DC883526683D7D5321F2F82788F18AB7C9DC7E9D0A4288
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d561f56294a5baf84c8550b2cbb31d72f845e0356071b6d65fe5b9095070472e
            • Instruction ID: e6fbd711e43bac453828d6fe7a455c90f8be4503902df7fb9bc625fffc63ae3a
            • Opcode Fuzzy Hash: d561f56294a5baf84c8550b2cbb31d72f845e0356071b6d65fe5b9095070472e
            • Instruction Fuzzy Hash: 58C189B3F116158BF3544D29CCA83626683EBD4315F2F82788B896B7C9DC7E6C0A4384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 01b1e48cd507cbe77021f0969278dd436773afd36ce13e319611aedee45cca84
            • Instruction ID: 6a81ecfda7dd17c824a43751582eb3b0a16e4e009cd66f8227d1a390d6b753b0
            • Opcode Fuzzy Hash: 01b1e48cd507cbe77021f0969278dd436773afd36ce13e319611aedee45cca84
            • Instruction Fuzzy Hash: 11A1A3F390C314AFE3006E59EC857BAFBE9EF44720F16452EEAC483744E67698048796
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ebfdd4a88f2a1a29a635bdd23db602c9f1b9b7c9dc818c3849addecd9b732d67
            • Instruction ID: ae41974401803055cd4fe7d15a979485a3423ff6c2ae8cda1e7398a0d15c6a7d
            • Opcode Fuzzy Hash: ebfdd4a88f2a1a29a635bdd23db602c9f1b9b7c9dc818c3849addecd9b732d67
            • Instruction Fuzzy Hash: 1BB18AF3F5162547F3580939DC983626683DBE5321F2F82388B596B7C9DCBE5C0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3914fccbf0059d58e562b04235d68ba32c94aa2add19aae5cae66b6371cf1ddb
            • Instruction ID: ae517378dfcdf52144659579bd9ac51005b0c06e03064a01ae2a65d76eb07e91
            • Opcode Fuzzy Hash: 3914fccbf0059d58e562b04235d68ba32c94aa2add19aae5cae66b6371cf1ddb
            • Instruction Fuzzy Hash: 63B19AE7F116214BF3444879DD983A22A83DBD5315F2F82388B59ABBCADC7D5D0A4384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6070e042d400f36d5bef2f86857ecff91bae705efa7e17a7d3a721dc270c30e2
            • Instruction ID: c3ff69af957a63cd6c1bb1aca6a88fadde97e3e14aa1d40e2bc0a6654197acfc
            • Opcode Fuzzy Hash: 6070e042d400f36d5bef2f86857ecff91bae705efa7e17a7d3a721dc270c30e2
            • Instruction Fuzzy Hash: 8FB188F3F116258BF3544968CC5836266839BA5321F2F82788F4CAB7C6D83E9C0A43C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b7588c27eadd2f315a8b0121a7333c0f281b2e1ad42712f276eb89f047f4d1aa
            • Instruction ID: 802462d4488c848786a309e7a2bc13db6f54f37eaf5b82b5ed33d48f18d7818b
            • Opcode Fuzzy Hash: b7588c27eadd2f315a8b0121a7333c0f281b2e1ad42712f276eb89f047f4d1aa
            • Instruction Fuzzy Hash: B0B1BCB3F112358BF3544978CC98352A6829B95325F2F82788E5CBB7C9E97E5C0A53C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3c23802687c98f57878e349cfe28c44463a5a9b48cfd0d2b69fb3ced5670151b
            • Instruction ID: 3755ac77b02d6cd9b9887ba2f0a5dcc9e524afb4cf1cfdc268a91a93897f54e0
            • Opcode Fuzzy Hash: 3c23802687c98f57878e349cfe28c44463a5a9b48cfd0d2b69fb3ced5670151b
            • Instruction Fuzzy Hash: 78B158B3E115244BF3984928CDA83A26683A7D4325F2F82798E8D6B7C5DD7E5D0A43C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dabff41f3f1cd6b66676eddbc5e94ddbc1ee74468a9a78b4ef3b7327acf2d9c8
            • Instruction ID: 7e1819ba625564ab4f519410c464812520047830b58e330115792af2c561887c
            • Opcode Fuzzy Hash: dabff41f3f1cd6b66676eddbc5e94ddbc1ee74468a9a78b4ef3b7327acf2d9c8
            • Instruction Fuzzy Hash: 8EB1ACB3F116258BF3544D28CCA43A276939BD5321F2F42788E59AB3C5E97E6C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 84c63c88c6c65462d5ef6b0605303d0ee00ad9db27bcb0e8b21c4b43cdccfcd0
            • Instruction ID: c1c5cc7f3c48f2546d66ff223527e70be766050d9619b01d32fdbd1c11230a2b
            • Opcode Fuzzy Hash: 84c63c88c6c65462d5ef6b0605303d0ee00ad9db27bcb0e8b21c4b43cdccfcd0
            • Instruction Fuzzy Hash: C8B19CB3F106254BF3584D78CCA83A26683DB94321F2F82398E4A9B7C5DD7E5C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1bdc3bcbb8272694839cdb41ef3bd1e8212a4e35d40d2e5a2d96f753174f68d5
            • Instruction ID: 37690581fd1bba8ac7ebe23ba50a514cb2d3f5aa0db7cbf2efa26fe347ffe45f
            • Opcode Fuzzy Hash: 1bdc3bcbb8272694839cdb41ef3bd1e8212a4e35d40d2e5a2d96f753174f68d5
            • Instruction Fuzzy Hash: D3B19BB3F606268BF3584D79DC983627682DB94314F2F42388F5CAB7C5E97E5C065284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 50ad4eb244976455eb5657646b2df9ec6fdc9a00e2698a685fdcc61488800c41
            • Instruction ID: fcab7b808e0c3c7a00b9e930da141b4ac93f66ab95e2c9bcde0992426a3fbfe0
            • Opcode Fuzzy Hash: 50ad4eb244976455eb5657646b2df9ec6fdc9a00e2698a685fdcc61488800c41
            • Instruction Fuzzy Hash: 49B17AF3F216258BF3584929CC983627683DBD5325F2F42388B5DAB7C5D93E9C0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3325922afde24b213a0977ea6785496ecfa8ded6821ebaa4765af5b58cc2f2e7
            • Instruction ID: ccf0a331f1c037280d29e333b77d101aa788c6ca3c13875a37bab58075575736
            • Opcode Fuzzy Hash: 3325922afde24b213a0977ea6785496ecfa8ded6821ebaa4765af5b58cc2f2e7
            • Instruction Fuzzy Hash: AEB1C0B3F115248BF3548D39CC583623683DBD5325F2F82798A58AB7C9D87E9D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2941360ca5d51df0e75d31dc1d3e8e1724bfb739505edef946628e09374f3279
            • Instruction ID: ef2233ced28c33b425654b4c420498957278b7b09ac834a91671f1b137c74ecd
            • Opcode Fuzzy Hash: 2941360ca5d51df0e75d31dc1d3e8e1724bfb739505edef946628e09374f3279
            • Instruction Fuzzy Hash: F8B17CB3F516254BF3484939DC983A26683DBD5314F2F823C8B499B7C9D87E9D0A5288
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fc34add0008763d027c2241d554dc274cadb205f2ebe16b6b0aee63ccf40cc1f
            • Instruction ID: 6d51af55bd5ddbd99b540af8a61f03d0ee20e77dcf2005793a54eded1a94cd34
            • Opcode Fuzzy Hash: fc34add0008763d027c2241d554dc274cadb205f2ebe16b6b0aee63ccf40cc1f
            • Instruction Fuzzy Hash: 9FB18DF3F216214BF3544968CC993A26683DB94324F2F82788F5CAB7C5D97E9D0A52C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d9ef0fd9c0e7e2e036f84fc8c6327d7466653baf0a367980c787fc56147c807b
            • Instruction ID: f9a46dd62bfb4bb33a02705bb12eadb5758dbb5bad49e9f484c1bf699926bb0e
            • Opcode Fuzzy Hash: d9ef0fd9c0e7e2e036f84fc8c6327d7466653baf0a367980c787fc56147c807b
            • Instruction Fuzzy Hash: FAB1ADB3F116258BF3504E29DC983A27683ABD5321F2F42788E4C6B7C5E97E5C069784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bbc6f3a208c19366eab4d2cba71fe8445bd11d8e8e7378c694d295a179efd7b6
            • Instruction ID: 8ee719aa5d2cf6119908643cac52d9b591b9aaa46dc88266cde090b7608c7a52
            • Opcode Fuzzy Hash: bbc6f3a208c19366eab4d2cba71fe8445bd11d8e8e7378c694d295a179efd7b6
            • Instruction Fuzzy Hash: E9B17CB3F1162587F3544939CC54362A2839BD5725F2F82789E5CAB7C5EC7E5C0A42C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 54b594e5929e98c4e35ab5d6428135a1c577266f0b4a088d8c6e7a05b2016a16
            • Instruction ID: 75fc867c5989711901dd0adc95c36faa45239f1d8a6e6374128b06d0b8455f80
            • Opcode Fuzzy Hash: 54b594e5929e98c4e35ab5d6428135a1c577266f0b4a088d8c6e7a05b2016a16
            • Instruction Fuzzy Hash: 3FB1BEB3F216254BF3844934CCA93A22642DB95324F2F82788F5DAB7C5DC7E9D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 84d176a11ba0ec99d5c079bb7e370a6f872ee65f93e41b89bf90775199c9f997
            • Instruction ID: 91ef331cfd6eaf9fbfcd7ae29d93b1e1799e5b10c520c66aad612acd3ce6058c
            • Opcode Fuzzy Hash: 84d176a11ba0ec99d5c079bb7e370a6f872ee65f93e41b89bf90775199c9f997
            • Instruction Fuzzy Hash: 1EB19AB3F116214BF3548939CD983626683EBD4314F2F82788E48AB7C9D97E9C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3cce4e640d9d0383ce33e580aff241a6c1fda31b2a1ef9120df505f19a451d77
            • Instruction ID: 3c8f41f2218e132c67d7c53a7493215b409abcfbf3ba6eb30a8ab058fe4a6e83
            • Opcode Fuzzy Hash: 3cce4e640d9d0383ce33e580aff241a6c1fda31b2a1ef9120df505f19a451d77
            • Instruction Fuzzy Hash: B0B189B3F1162547F3984929CC6836266839BD4325F3F827C8E5AAB7C6DC7E5C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1b1709f91196118b86e065017805a98a8c8389e65b002963081138a5b1b9ac25
            • Instruction ID: 02ba97b604613c9212e7dadb27a77a7a5a66f2a10f29e7dc36cd45ef8426d985
            • Opcode Fuzzy Hash: 1b1709f91196118b86e065017805a98a8c8389e65b002963081138a5b1b9ac25
            • Instruction Fuzzy Hash: 42B1AEB3E106258BF3544939CD8836276929B91320F2F8278CE6CABBC5DD7E5D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ea70746211491c9633eb93f15cf4e26e63f6f2d8c41efad52cc00b43aa2ef949
            • Instruction ID: 39a0a64aaad463db03975764d3821082678b4a946ff0b1cebd9ed9f1e9889c89
            • Opcode Fuzzy Hash: ea70746211491c9633eb93f15cf4e26e63f6f2d8c41efad52cc00b43aa2ef949
            • Instruction Fuzzy Hash: 39A1AEB3F116254BF3544938DC993A27693DB95324F2F82798A4DABBC6DC3D8C0A4384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d4581a01e2d7f387af14d206be9b699fb778ea9edc5226a36f8b89c7f00629bc
            • Instruction ID: 9c60e3f01231a8ca736745af0f7e53e1e8af6c683531c469c2f6710825614b1b
            • Opcode Fuzzy Hash: d4581a01e2d7f387af14d206be9b699fb778ea9edc5226a36f8b89c7f00629bc
            • Instruction Fuzzy Hash: 00B169B7F116258BF3584E29DC983626683DBD4311F2F82388F496B7C5D97E6C0A5388
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 57fe80dddcb21d0550090bcfc693c19f236ef1d6e7f94c142778a18efeb4f4ae
            • Instruction ID: d207a3d3ae70f1e698e6af954378b641dcf8cc5fac311a8cc5da52cf74c94e91
            • Opcode Fuzzy Hash: 57fe80dddcb21d0550090bcfc693c19f236ef1d6e7f94c142778a18efeb4f4ae
            • Instruction Fuzzy Hash: 33A1BCB3F116258BF3544978CD683A2668397D4321F2F82388F5D6B7C9E87E5C0A4288
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 25b514441a7b14024a3d742d4dd21de0d5c183062d4d8e357310b9cae25f57e0
            • Instruction ID: 89cc3ba2746173c17b6c070d7b4a9f4f48ec4018f35dbeb4cc489beaae30a4c0
            • Opcode Fuzzy Hash: 25b514441a7b14024a3d742d4dd21de0d5c183062d4d8e357310b9cae25f57e0
            • Instruction Fuzzy Hash: 52A1DEB3F116258BF35449A8CC983A2B6839BD5321F3F42788E1C6B7C5D97E5C0992C8
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e3be55fd5c6c81d84e4d94ae2287ece9c92cd1458bf5e014056bb79d6fe34487
            • Instruction ID: 336d9b8a9e75e2b7fbdb481f654b8ff23bfc180c0d70221ef6d6d17d2f31bad1
            • Opcode Fuzzy Hash: e3be55fd5c6c81d84e4d94ae2287ece9c92cd1458bf5e014056bb79d6fe34487
            • Instruction Fuzzy Hash: 80B1BEB3F116214BF3544929CC58362B682DBE4321F2F82388F4DABBC5D97E9D0A52C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a26d80ae00c8da32b9549df13fff0662a992009e89df090f037a0cc82accd1ec
            • Instruction ID: 4582a204ba48eb023d55b98d0ca6dd64f1dec787731d5506f813723c4118de8c
            • Opcode Fuzzy Hash: a26d80ae00c8da32b9549df13fff0662a992009e89df090f037a0cc82accd1ec
            • Instruction Fuzzy Hash: 92A16DB3F116254BF3444D29DC983A27683DBD5321F2F82788E589B7C5D87E9D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6e56f72f1b2902ba3eeaa79eec7409037cf7fc5d2608139bfc36a8a210719d86
            • Instruction ID: 878da212ab2e80a042db1d9b3d2d271c6507aec9bb6e963020557aa5adc9cbab
            • Opcode Fuzzy Hash: 6e56f72f1b2902ba3eeaa79eec7409037cf7fc5d2608139bfc36a8a210719d86
            • Instruction Fuzzy Hash: FBA18AB3F116258BF3544979CDA83626683EBD5320F2F82388F586B7C5D97E5C0A5288
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 67a5cbc95e345571218eb411ec7ea9ad126f52371171a9af243b139d58c7d8d2
            • Instruction ID: 76905a923e5d5736fe42e0e4edfd7cb9aa28d15ea6bae99ea8c3cc2a14244afa
            • Opcode Fuzzy Hash: 67a5cbc95e345571218eb411ec7ea9ad126f52371171a9af243b139d58c7d8d2
            • Instruction Fuzzy Hash: C2A1CEB3F215258BF3504E28CC583A27693EBD5320F2F42788A9C6B7C5D93E5D0A9384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cf0afa9dd40fd1b5fa202d814ebddc1e2636c01015a11bb58e5955b284d9c35f
            • Instruction ID: 5bcfc9874c2bbdfb602a5c87d5c0ef33e5f3945c37e8b4f3f8c258117017a876
            • Opcode Fuzzy Hash: cf0afa9dd40fd1b5fa202d814ebddc1e2636c01015a11bb58e5955b284d9c35f
            • Instruction Fuzzy Hash: 60A1B1B3F116258BF3544E28CC943627283DB99311F2F82788F49AB7C9E93E5C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 14339fc345a4563f4c3e565aee977132be0060c2743617961448836adb5d32c5
            • Instruction ID: cbdd1f8408e526162d9918101f03508525f85f02be2cd202ab158c3aea35118c
            • Opcode Fuzzy Hash: 14339fc345a4563f4c3e565aee977132be0060c2743617961448836adb5d32c5
            • Instruction Fuzzy Hash: 7DA19DB3F516244BF3548939CC983627282DB95311F2F82788F4DAB7C5D97E6D0A5388
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b8f9e4104865eb584ddfa8dff007d042fa7f15f8753b70ddc0d700a685618bab
            • Instruction ID: 236d86c41cbc3eb2899995833aece323da6d87550e78b6b250dc1c6c541e7919
            • Opcode Fuzzy Hash: b8f9e4104865eb584ddfa8dff007d042fa7f15f8753b70ddc0d700a685618bab
            • Instruction Fuzzy Hash: 6BA1BCB3F202258BF3984938CC5936276929BE5320F2F42788F5DAB7C5DD7E5C0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0b6280f321ea505ed13640ce714c47e0bca06777a614646e2060b87fcedf8506
            • Instruction ID: 43dbb254d2242543fa09f1054c084c6ee0de237c93ffb1fba05ab1670f83fa67
            • Opcode Fuzzy Hash: 0b6280f321ea505ed13640ce714c47e0bca06777a614646e2060b87fcedf8506
            • Instruction Fuzzy Hash: D7A19BB7F116248BF3444979CC983626683EBD5314F2F82788F586BBC9D87E5D0A5388
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2320a2378c36ffd6756dae10d2bb7cc8fd5940e740db88a2907ac821d58333f1
            • Instruction ID: 867798ae0271e71014330955b2e001e6d45a87a340ff33f9e6ad181d329c5cb9
            • Opcode Fuzzy Hash: 2320a2378c36ffd6756dae10d2bb7cc8fd5940e740db88a2907ac821d58333f1
            • Instruction Fuzzy Hash: 4FA1B0F3F216254BF3444939CD683626683DBE5320F2F82398B5D9B7C5DCBE990A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e6e6e980531f89416b0e893f7a0f035403aa135415f12dc7dee9aa361779e533
            • Instruction ID: 99f35923f343929245684c9fa7317cc9c3398659f87f6feb437e9de12a37f661
            • Opcode Fuzzy Hash: e6e6e980531f89416b0e893f7a0f035403aa135415f12dc7dee9aa361779e533
            • Instruction Fuzzy Hash: 9DA19DB3F116214BF3484938CCA83A26683DB95311F2F827C8F59AB7C9D87E5D095388
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bd0e7ad8f6ddf6f66d47f247f06b9def45b12f72491d2759ac6730a1336132ed
            • Instruction ID: 22258e86a3aca0afeca46b3a8655b119f8fe51688b4b2a6aba49899ec22bb8f9
            • Opcode Fuzzy Hash: bd0e7ad8f6ddf6f66d47f247f06b9def45b12f72491d2759ac6730a1336132ed
            • Instruction Fuzzy Hash: 9BA16BB3F212258BF3544979CD983626683DBD5324F2F83388F69AB7C9D87E5D094284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ce818b9e04e3037dc186e1b48a39ddb6b4fe51d25b9e6fc1cb181e787d224054
            • Instruction ID: e5fa4a236cc9528290b8ff6197dac3242d6b6379e38b5de0aa5bdfd16d6974c0
            • Opcode Fuzzy Hash: ce818b9e04e3037dc186e1b48a39ddb6b4fe51d25b9e6fc1cb181e787d224054
            • Instruction Fuzzy Hash: 16A18C73F112168BF3504E29CC583A27753EBD6321F2F82788A985B7C5D93E9C0A9784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fced3550a87b8ec15ebb4113d5dce2dda76a15ca2912d1493895da9946b169ab
            • Instruction ID: d0fa63277b52867ec33dd09b12e04d400bfc456904cef560542b90b279b57d76
            • Opcode Fuzzy Hash: fced3550a87b8ec15ebb4113d5dce2dda76a15ca2912d1493895da9946b169ab
            • Instruction Fuzzy Hash: 59A1ABB3F112254BF3944939CD983627683DBD9320F2F82788E59AB7C9D97E5C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 562ac0e371bc820037228b45fc56119e6ed5b11e6a350fb0967cbc6bac3420f4
            • Instruction ID: 1b1f21fd2d4937e086f7baa2add0e04f6bfa7af2b45332ddfe91ebfec24ec643
            • Opcode Fuzzy Hash: 562ac0e371bc820037228b45fc56119e6ed5b11e6a350fb0967cbc6bac3420f4
            • Instruction Fuzzy Hash: 23A1ACB3F112248BF3544D39CCA83627683DBD5321F2F82788A995B7C9DD7E680A5380
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: eb184126e83373ca6ac9f86b082103d8a4aee2895aeb4980b1a452d492f72d3f
            • Instruction ID: 4ce67d002f58799e70b0473d674f2779b0b6b0383409919d79aa97bfa73900f0
            • Opcode Fuzzy Hash: eb184126e83373ca6ac9f86b082103d8a4aee2895aeb4980b1a452d492f72d3f
            • Instruction Fuzzy Hash: EAA19CF7F116254BF3544939CC583622683EBD5314F2F82788B986BBC9D87E9C0A5388
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4770f35277737fae7b37e440884d57d76142b8f887e097bfa166513f3ffd2832
            • Instruction ID: b8f9d1cf6eb87ec2362a24e28a2b1e41dbc2ac3bb073ac40eaa18d322857656d
            • Opcode Fuzzy Hash: 4770f35277737fae7b37e440884d57d76142b8f887e097bfa166513f3ffd2832
            • Instruction Fuzzy Hash: C0A179B3F116258BF3548939CD683627643ABD5321F2F82788E9C6B7C9D93E5D0A4384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 61322235033f0a3d157c07069715f60e90f65f7564a61fa7b9af6fb9e5d46d72
            • Instruction ID: a22135fe0b1f13495518039246904395634956fddb123972ed3bf6b5d5abc447
            • Opcode Fuzzy Hash: 61322235033f0a3d157c07069715f60e90f65f7564a61fa7b9af6fb9e5d46d72
            • Instruction Fuzzy Hash: 93A1BCB3F116244BF3544968CC983A2B683DBE4311F2F82788F5DAB7C6E87E5D095284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f01241274dff2af0bf31789ac8071c1bdf871f9967deb91c017fbfcade40ef8f
            • Instruction ID: f8de723548c157917b33c1e5ac2a38d024d9865a7125a25ac23d38eab972e0fa
            • Opcode Fuzzy Hash: f01241274dff2af0bf31789ac8071c1bdf871f9967deb91c017fbfcade40ef8f
            • Instruction Fuzzy Hash: 27A18BB3F216258BF3544A29CC583627683ABD4321F3F42788E5C6B7C5D93E9D0A5388
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0a34ac7a3e3c5c964d036fe20a4e4d7cbd6328d468c3523be73bb35a99f40292
            • Instruction ID: 7c2abb1debf7b108774c2af1b2c2dc98e51df42bcc858534efdb44751f923995
            • Opcode Fuzzy Hash: 0a34ac7a3e3c5c964d036fe20a4e4d7cbd6328d468c3523be73bb35a99f40292
            • Instruction Fuzzy Hash: 81A14AB3F102258BF7544E29CCA43627692DB95320F2F42788F4DAB7C5D97E5C0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 08e3135216d3f641546e35d69462161351d49f5b32c1c36f302c9145f5b9a7e2
            • Instruction ID: 0ace26e4740348c65a661529f8186b8a61e0761c5b19a2747d2ca9e6d890ae49
            • Opcode Fuzzy Hash: 08e3135216d3f641546e35d69462161351d49f5b32c1c36f302c9145f5b9a7e2
            • Instruction Fuzzy Hash: F8A1AEB3F2162587F3544939CC983627683DBE9321F2F82788E98AB7C5D93E5D065384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 26d18e95021910b5f241deb18f1574340ad4eaca5548dd602fb0b8dc0b8811f9
            • Instruction ID: 7c7d145bfaecb30b14cd15326bc417293936df5ff4b20faa06177ea506602036
            • Opcode Fuzzy Hash: 26d18e95021910b5f241deb18f1574340ad4eaca5548dd602fb0b8dc0b8811f9
            • Instruction Fuzzy Hash: 99A19CB7F506348BF3244969DC9836266829B94325F2F82788F8C7B7C5D87E5C0A53C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8516988baf2a6c7357ccb56ba2d184c47329be2e777ab85e1acdb119e553b09c
            • Instruction ID: 978625020d233fce614a63697a67821f1f363045aaa5be818fae2e856f456ebd
            • Opcode Fuzzy Hash: 8516988baf2a6c7357ccb56ba2d184c47329be2e777ab85e1acdb119e553b09c
            • Instruction Fuzzy Hash: C9A1A0F3F116244BF3444979DC583626683D7E5325F2F82788F596BBCAD87D5C0A0288
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: af5da5fc80925ea9a307d77e3c6cca8bf82d12e5c7df93758713f02692cc3ff5
            • Instruction ID: b57e8fd4e3a30bff30de090550f51887580e9690d2fd40fc8944856f30125af3
            • Opcode Fuzzy Hash: af5da5fc80925ea9a307d77e3c6cca8bf82d12e5c7df93758713f02692cc3ff5
            • Instruction Fuzzy Hash: 2EA1A0F7F1262487F3844938CC983626693E794325F2F82388E68AB7C5DD7E5D094384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 75ad2a48447408c6fdd04bb5dc07592135cc820273c8874cabc1552ae593f3a4
            • Instruction ID: 302d3abfa71c272d7ec322e4ac01f5947c3c8c6e56c0e6e626b410033ef4fb5e
            • Opcode Fuzzy Hash: 75ad2a48447408c6fdd04bb5dc07592135cc820273c8874cabc1552ae593f3a4
            • Instruction Fuzzy Hash: 1FA179B3F116218BF3544D39DD993626683DB95321F2F82388F896BBC9D93E5C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 70c986754293bbd652c5811646670e10bacd86f3d0c3dbd89a66397ddd030fcb
            • Instruction ID: c59ac5c0a5967546c7a513fe3e82939c4a170e88c2331434003e7a456892b063
            • Opcode Fuzzy Hash: 70c986754293bbd652c5811646670e10bacd86f3d0c3dbd89a66397ddd030fcb
            • Instruction Fuzzy Hash: 6BA1ACB3F216214BF3844979CC983A26643E7D5314F2F82788F5CAB7CAD87E9D095284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9b0e619fff8a226ab0e5efb4a3e003610aebfbff8a0c14a561acbf9ab096d5bb
            • Instruction ID: dc99e857195bbef7f928dca62863812da65234dcf2cc50b3e22b79495b17ce4a
            • Opcode Fuzzy Hash: 9b0e619fff8a226ab0e5efb4a3e003610aebfbff8a0c14a561acbf9ab096d5bb
            • Instruction Fuzzy Hash: 65A19CB3F116268BF3544D38CC983627692EB95321F2F42788E886B7C5D93EAD0957C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5f8dc5056ed85915a2abe573cfc4a563e8ea17f6885531341c10d2910fe35875
            • Instruction ID: ee9b5d57b5405fdd29c5d4c247445e686b3e288bb336220c0a0b8929fa7861da
            • Opcode Fuzzy Hash: 5f8dc5056ed85915a2abe573cfc4a563e8ea17f6885531341c10d2910fe35875
            • Instruction Fuzzy Hash: 38A190B3E116258BF3644E29DC843A27692EB95325F2F42788E8C6B3C5E93F5C0657C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e915aeebe68dcdddd80f1091609472ac010fecbe262798b3659edffdd4bb27b7
            • Instruction ID: b27a25038a1a34a573e96eb8797acb198022f59f8730037a944e2e40c4006190
            • Opcode Fuzzy Hash: e915aeebe68dcdddd80f1091609472ac010fecbe262798b3659edffdd4bb27b7
            • Instruction Fuzzy Hash: 5C918BB3F206254BF3444C39CD583A2668397D5325F2F82788F59AB7C6D87E9C0A4388
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a3a956f5bf3147c5a1ef0985aecee215e776dc29bffc3d30618fc8279544e2d4
            • Instruction ID: baced76b4997b722dc50c07d9ef2d6e5c3f25e30a536e120f282d8ff0965becb
            • Opcode Fuzzy Hash: a3a956f5bf3147c5a1ef0985aecee215e776dc29bffc3d30618fc8279544e2d4
            • Instruction Fuzzy Hash: 01918DB3F5072547F34449B9DCA83A26683DBD4324F2F42388F59AB7C5E87E9D065284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: aac130f19147f62549be038077312c592de45b1c10b3a4684aab158a12096e63
            • Instruction ID: 7f6435cd1de7b1181a134e9ec564711168f3666de12f9a73f1780abba7405eb4
            • Opcode Fuzzy Hash: aac130f19147f62549be038077312c592de45b1c10b3a4684aab158a12096e63
            • Instruction Fuzzy Hash: E591BDB3F112258BF3544D69CC88362B692ABD4320F2F82788E9C6B7C5D97E5C0986C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 97fe8462af073865f4905efb07c25533eaf6a766fe596916cff30700b0c1f6f9
            • Instruction ID: 96b4c56356e0f0a12849d9603264b07b80a948016832f97e77db2a05950fd198
            • Opcode Fuzzy Hash: 97fe8462af073865f4905efb07c25533eaf6a766fe596916cff30700b0c1f6f9
            • Instruction Fuzzy Hash: 1C917CB3F506254BF3544D79CC98362A683DBD5321F2F82388F58ABBC9D8BD5C0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2814a05436e3e71aab011518df208c354b36b9159dff054ef8ff2a5163862716
            • Instruction ID: f8c1c64b0d50f973d73e0e919675a4c99b272c207b59070b5a8a353fe426290d
            • Opcode Fuzzy Hash: 2814a05436e3e71aab011518df208c354b36b9159dff054ef8ff2a5163862716
            • Instruction Fuzzy Hash: EC9156B7F1252447F3944938CCA83626693AB95320F3F82798E9DAB7C5DC3E5D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8ae4778d89a22f0ab5de77862e1889fd3391e4f56dbe9f6d3c5d32c898b9d5fd
            • Instruction ID: d1751d8c1c4298b221366fa9871efe166e73084f779d2d3130a15a0fee5f2db7
            • Opcode Fuzzy Hash: 8ae4778d89a22f0ab5de77862e1889fd3391e4f56dbe9f6d3c5d32c898b9d5fd
            • Instruction Fuzzy Hash: C5919AB3E516258BF3544E74CC983627693EBD1311F2F42388A482B7C9E97E6C099684
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a32af5dcd8eebdacda033c2aea7ac674ab25007594bd0865ad47b6db749b6903
            • Instruction ID: 7e6e0964463ccda578f88ac14815cf8dfc946d608c0a88b7c73d5a194a43dc97
            • Opcode Fuzzy Hash: a32af5dcd8eebdacda033c2aea7ac674ab25007594bd0865ad47b6db749b6903
            • Instruction Fuzzy Hash: 569169F7F5162587F3444D29CC983A27682D7A4321F2F82788E4D6B7C6D97E6C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 492214c4bd5b8b70e9e1dc28da9398db25cf53eb1d39d3cbfbbdef211c9791e8
            • Instruction ID: 805abc806549cc5c39c4194a9ea32c26a3e39c5eb562c2c20beb24dccea16f34
            • Opcode Fuzzy Hash: 492214c4bd5b8b70e9e1dc28da9398db25cf53eb1d39d3cbfbbdef211c9791e8
            • Instruction Fuzzy Hash: E091BCB7F112258BF3444E68DC983A27793DB95320F2F42388E582B7C5D97E6C0A9784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 670ea9b0cc847263f5b3a1bd37f44852850945fb56cf219e3669877be1b1f853
            • Instruction ID: bd47edb460c0b88b9eed944f557bcb705b6cf2206c23fe16188d1ce9916db1e6
            • Opcode Fuzzy Hash: 670ea9b0cc847263f5b3a1bd37f44852850945fb56cf219e3669877be1b1f853
            • Instruction Fuzzy Hash: 6C918DB3F106248BF3144E39CC983627692DB95320F2F42788E9C6B7D5D97E6D0A9784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e4f5f7865930dad19702db9a4236bf1f11f02a91f0934a01981ce5de32c253cb
            • Instruction ID: 9118121ba6fbbf9ac995bc5ee96ca9c902d858187a27d1c6aef34a3bad3db514
            • Opcode Fuzzy Hash: e4f5f7865930dad19702db9a4236bf1f11f02a91f0934a01981ce5de32c253cb
            • Instruction Fuzzy Hash: CB916EF3F116254BF3544969CC58362A683DBE4310F2F82788E5CABBC5E97E9D0A52C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 344cde3655ff6a1185fa8f4ce12a2eef2469c7a4301e4db4c231739fa4918865
            • Instruction ID: 8ffcb2c8e79e1e653b27e0b7a1a3c2cd4f5e91a28005e972f029870a35cea59b
            • Opcode Fuzzy Hash: 344cde3655ff6a1185fa8f4ce12a2eef2469c7a4301e4db4c231739fa4918865
            • Instruction Fuzzy Hash: F3919FB3F1162547F3444979CDA83626683D7D4320F2F82788B59ABBCADC7E9C0A4384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 96f47d4d6ce42939757ae29c8156729419d422d2846d812bb5dcf65a2ba79b1f
            • Instruction ID: 3af89853ff6e9f0946fd431741a9e367d8155b50fbd42967ad6dbb44955f2b6a
            • Opcode Fuzzy Hash: 96f47d4d6ce42939757ae29c8156729419d422d2846d812bb5dcf65a2ba79b1f
            • Instruction Fuzzy Hash: FC91C0B3F106258BF3144E69CC943627693EB95315F2F81788E4C6B7C9E93E6C0A9784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 475fe7e3a51ac5d385fed2263d1ace12b6c78aed23c1255dcb6234baaf0b3fd4
            • Instruction ID: 2515816ca4aa476cd161c590d90be2706dc658a1b1b4f8c777d79b50ab3999d6
            • Opcode Fuzzy Hash: 475fe7e3a51ac5d385fed2263d1ace12b6c78aed23c1255dcb6234baaf0b3fd4
            • Instruction Fuzzy Hash: DF918EB7F116248BF3544A29CCA4362B293DBD5321F2F427D8E996B3C1D93E6C0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0440bd07b5f872ef93b99c985f2a15d9d2c990406bff44fd0a6e364925955441
            • Instruction ID: 6f297db3a394bfe827f3db512faea0ddbf6ac142dd374b15b01154a30868a015
            • Opcode Fuzzy Hash: 0440bd07b5f872ef93b99c985f2a15d9d2c990406bff44fd0a6e364925955441
            • Instruction Fuzzy Hash: FA91AEB3F112248BF3544E29CC943627793DBD5324F2F42788E59AB7C5D97E6C0A8684
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 55d53f2ed04019daeab49d56c2d5051ef602ca89e0c4f3ee9b7cb3b1ff030aaf
            • Instruction ID: 9f6b78049b1bc35da0a7e9837de140f73bfb9e96360ba8f3812158baa425a775
            • Opcode Fuzzy Hash: 55d53f2ed04019daeab49d56c2d5051ef602ca89e0c4f3ee9b7cb3b1ff030aaf
            • Instruction Fuzzy Hash: 4C9198B3F516218BF3484929DCA83626283DBD5325F2F82388E19AB7C5DD7E5C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b16652528cddcdfa2860ecca94c42a6de6f847e5991471325f68703645663acd
            • Instruction ID: 0de1ee92ca678682dd5d44dda50c26fd950ab09e1387fa29ac54ffe4d13a2798
            • Opcode Fuzzy Hash: b16652528cddcdfa2860ecca94c42a6de6f847e5991471325f68703645663acd
            • Instruction Fuzzy Hash: 7191DDB3F606258BF3444A28CC983723693DBD5311F2E8278CA495B7D9D97D6C0A9784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 30b4d4994b7471aac765c36fc9423c69a6d6aae48d5340624ce9dd522c59fbd6
            • Instruction ID: 19361b90325b9d9d73c8e041afa36159e144afda2a8d8c474818b655e4fb9d80
            • Opcode Fuzzy Hash: 30b4d4994b7471aac765c36fc9423c69a6d6aae48d5340624ce9dd522c59fbd6
            • Instruction Fuzzy Hash: 5C9179F3F216358BF3544968CC9836266839BA5325F2F42788E5C6B7C6E83E5D0A52C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 193266c011156c49a9c0fb8247a25fcb050cf1158cf3f3920fda5222e021edbd
            • Instruction ID: 7a014d7df72e84746104e76f5c1939c1b83599de2cf4236f65c01f728d087759
            • Opcode Fuzzy Hash: 193266c011156c49a9c0fb8247a25fcb050cf1158cf3f3920fda5222e021edbd
            • Instruction Fuzzy Hash: 89917BF3F216254BF3544978DD9836266839BD4324F2F82388F4C6BBCAD97E5D0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e928079787262f90901142b23350373ccf7e96de86ee74457dfbefd83a623645
            • Instruction ID: 6258263ead436b82f3b898dbb1dc36dbc62c5c66a88997d7ee0806e7aa7fe619
            • Opcode Fuzzy Hash: e928079787262f90901142b23350373ccf7e96de86ee74457dfbefd83a623645
            • Instruction Fuzzy Hash: D9919DB3F112248BF3544E29CD983A27683DBD4311F2F82798E596B3C5D97E6C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d1093548f312771777d8fa00995d56936d1afb387f9a2cf723d64083a3eb1def
            • Instruction ID: 146df11ddf352ba1a2cd203e30892edbd523695a2e51648c68d5e87542ffe2cd
            • Opcode Fuzzy Hash: d1093548f312771777d8fa00995d56936d1afb387f9a2cf723d64083a3eb1def
            • Instruction Fuzzy Hash: 7A91AEB3F106248BF3544E29DC943A27793DBD9315F2F82788A482B7C5D93E6C0A9784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d571c75b1641c2a1c61d085164ef78741d3c35cc14833374c6ba4243b3996dea
            • Instruction ID: 5ebfd8fc15c09c0c7aacc05d9fd728d1b5b7a2030fdeee2db722e3bede53b414
            • Opcode Fuzzy Hash: d571c75b1641c2a1c61d085164ef78741d3c35cc14833374c6ba4243b3996dea
            • Instruction Fuzzy Hash: A9918CF7F116248BF3448929CC983626683D7E4315F2F82788F59AB7CAD97E5C0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7731c6234ffd338b2f3afa0945976a2223146d2e8e55781785f6cbe3cd12a091
            • Instruction ID: 7aa861cee4461895fb9e801d43ef4135bd4b5a61b66cb99ea3ccd8a2e73f00a9
            • Opcode Fuzzy Hash: 7731c6234ffd338b2f3afa0945976a2223146d2e8e55781785f6cbe3cd12a091
            • Instruction Fuzzy Hash: E69199F3F506258BF3480939CDA83A16642EBA4325F2F82788F4D6B7C5D87E9D095284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e7ceb1f243081bf177360f0cfa3b257ba430b6291fcf0260207b044938c185b9
            • Instruction ID: 0b22a07395ba5acf89f6d5d48765a88cf22a187385336778bfd82981576ea302
            • Opcode Fuzzy Hash: e7ceb1f243081bf177360f0cfa3b257ba430b6291fcf0260207b044938c185b9
            • Instruction Fuzzy Hash: 0891BDF3F116258BF3544939CC983A26683DBD5315F2F82788E4C6B7C9E87E5C0A9284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a738e952ec329c50529a1995428616a3abbf8cbcb89cdb9aeccfe3036ed0a28b
            • Instruction ID: 908a1f9204e5f2a8abfc0fd90c473bdd4856d47a01385b0354ca98baec41c2fc
            • Opcode Fuzzy Hash: a738e952ec329c50529a1995428616a3abbf8cbcb89cdb9aeccfe3036ed0a28b
            • Instruction Fuzzy Hash: 36918EB3F506258BF3404965CC983627693D799325F2F4278CE886B3CAD97E9C0A97C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fbd0554af8461e839b3d098898aece7d985673fc3822e3ba4c29a27fc5baf45e
            • Instruction ID: 35466da6d485c56df43408e672ed880ecde0c2fead26ecc979e39ce58f4e5698
            • Opcode Fuzzy Hash: fbd0554af8461e839b3d098898aece7d985673fc3822e3ba4c29a27fc5baf45e
            • Instruction Fuzzy Hash: AF917AB3F116258BF3544D29CC983627683ABD4325F2F81388E8DAB7C5D93E9D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 94d5b21290a33ed7167f23a1a40af3b7ce65a74a2e4d451d67a623e80d722d77
            • Instruction ID: 27e5bf77a0ecae9e875c2b4ab2500e71d09a35acc4a056186238b7fcb10c7a49
            • Opcode Fuzzy Hash: 94d5b21290a33ed7167f23a1a40af3b7ce65a74a2e4d451d67a623e80d722d77
            • Instruction Fuzzy Hash: 51916CB3F116268BF3484D38CD693727682DB91325F2F42388B5A9B7C5DD3D9D095288
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ab3fd2ce089c5dcfaa5976634de777313fe7b745707aad3976ad3a6f1c1c5d56
            • Instruction ID: 5b5664ce8f1150ebced0a8154b9ac270d71d32abaa5579dfbd952619bd90969f
            • Opcode Fuzzy Hash: ab3fd2ce089c5dcfaa5976634de777313fe7b745707aad3976ad3a6f1c1c5d56
            • Instruction Fuzzy Hash: A291DCB3F5122587F3584964CCA83B27683DB95321F3F82388F5A6B7C5E97E5C0A5280
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3a0e7a87d91e908c2b25cbd298be12c49f57f3377350df4d8a83b4e5e47265fb
            • Instruction ID: 30d47e5a4f9981502eda05c55fab2fa4a0c4ba59c600a341a99ed333cd58525e
            • Opcode Fuzzy Hash: 3a0e7a87d91e908c2b25cbd298be12c49f57f3377350df4d8a83b4e5e47265fb
            • Instruction Fuzzy Hash: 17917DB3F112258BF3544929CC943A27693ABD5321F2F82788E986B7C5D93E9D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 392649533d9e1ebd4416e38940a8ad6301e4cbbd85a41cb0f14d670178fd69b1
            • Instruction ID: 4f25e8fc2e7fe80246289340148ce5e8e72ee33864c1a36d58b918d34d33c2d9
            • Opcode Fuzzy Hash: 392649533d9e1ebd4416e38940a8ad6301e4cbbd85a41cb0f14d670178fd69b1
            • Instruction Fuzzy Hash: CE91A9B3F116208BF3544D39CC983A27682DB95321F2F42798F49AB7C5D97E6C0A5388
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d1674d32975cdaa3bf4b5d5f06652718fabeb3668676534ceef30ba50611a0a1
            • Instruction ID: 94b6ca4170056e2f37fcffd38024c56ebc919d68edb08f5fa8b8f8b52205b85d
            • Opcode Fuzzy Hash: d1674d32975cdaa3bf4b5d5f06652718fabeb3668676534ceef30ba50611a0a1
            • Instruction Fuzzy Hash: F4919D73F216254BF3544938CC983A27653EB85315F2F8278CE486BBC9D87E5D499384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a267fd96e01f18101504417b9eb3e0b8c6399038f1603d8002efeadd1d2e5b48
            • Instruction ID: 9c3cfe113c12b65059d0b2a0e51e65ddfd188edb35b1e3bc6ae56fb20d99502b
            • Opcode Fuzzy Hash: a267fd96e01f18101504417b9eb3e0b8c6399038f1603d8002efeadd1d2e5b48
            • Instruction Fuzzy Hash: 9B91ACB3F5162587F3544D25DC983A27683DBD4310F2F82788E896BBC9D87E5D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 00572f8932072140f15429858cad32844d1c16f494406b6a35b4586214eba9d1
            • Instruction ID: 2f5b37c4c8b4af53465f49f4cfaef31b2822f746d4bf875f3eb30cab448a02b3
            • Opcode Fuzzy Hash: 00572f8932072140f15429858cad32844d1c16f494406b6a35b4586214eba9d1
            • Instruction Fuzzy Hash: E791AAB3F111258BF3444E29CC58362B693ABD5324F2F42788E5C6BBC5D93E6D0A9784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 359fc37797c5545b87ab7005a0dd550c187542c848550cd72b1f51e9339f7051
            • Instruction ID: 02495f53a8e45c11faaf5c7c82700458567597b11bf269a0e41cbf154a1ee9bd
            • Opcode Fuzzy Hash: 359fc37797c5545b87ab7005a0dd550c187542c848550cd72b1f51e9339f7051
            • Instruction Fuzzy Hash: D28166B7F112258BF3504E29DC983A2B693ABD5320F3F42788A5C9B3C5D97E9C065784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a7a711d397848c402d4f0b9cc207fdd0001b393c8a1c183baf67ebaa3b4c386a
            • Instruction ID: 6ec5075a2edeec2b44c069cfc4c1ace9a1ea12f6c4715aad6a3c1e7e1a353025
            • Opcode Fuzzy Hash: a7a711d397848c402d4f0b9cc207fdd0001b393c8a1c183baf67ebaa3b4c386a
            • Instruction Fuzzy Hash: 0791AFB3F106248BF3444D29DC983A27693DBD5324F2F82788E58AB7C5D97E6C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 41ade28736acd2b244267229048b421e7f11ffb8b629b9c9ac7b94ceb87e260d
            • Instruction ID: 1076cec17b1bb2b596e1ab57134fe2451914cc90e694a8e336d5a090e837c1ef
            • Opcode Fuzzy Hash: 41ade28736acd2b244267229048b421e7f11ffb8b629b9c9ac7b94ceb87e260d
            • Instruction Fuzzy Hash: CB918BB3F206258BF3544A38CC583A27693DB95321F2F42788F596B7C5D93EAD095384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3d4c787963814343ae6fc929df17a08627a5b0db59b2795425150646c98cb886
            • Instruction ID: 2a08007de5f6e627df092ef5f467c83f9b3f8e78dfb4d695492c0aafea04b950
            • Opcode Fuzzy Hash: 3d4c787963814343ae6fc929df17a08627a5b0db59b2795425150646c98cb886
            • Instruction Fuzzy Hash: 19816CB3F106254BF3544979CD983A27A83DBD4314F2F82788F58ABBC9D87E5D0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0c1880efb01c20dd3108ade1f6da6977fc38a8663e1d894c9c7f0a4efb270671
            • Instruction ID: cb9c9e4e663ddc40f560bdbfa919e3de9a56d6c1f3cfb8bf24aa4e44781a6fcc
            • Opcode Fuzzy Hash: 0c1880efb01c20dd3108ade1f6da6977fc38a8663e1d894c9c7f0a4efb270671
            • Instruction Fuzzy Hash: 13918CB3F112258BF3504E68CC583627793DB95311F2F82788E48AB7C5D93EAD09A784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7181d26b67a6d314e2f90aeec288c98fbaee8ed4e2bd40ce3027df4e1ac6b6cf
            • Instruction ID: 977bf2bc76faac5df9944f97d2c29eb819a7e5e04c859d35a546a87fd8416d0d
            • Opcode Fuzzy Hash: 7181d26b67a6d314e2f90aeec288c98fbaee8ed4e2bd40ce3027df4e1ac6b6cf
            • Instruction Fuzzy Hash: E381EEB3F111248BF3544E28CC583627693EBD4311F2F82388E496BBC9D97E6D4A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 523fbcdccefe4602d160f78a08eb89ccf25e4bcfc7e0ec9768cfe376e86c1e98
            • Instruction ID: da63cf82975bd733bfa9bfbd31e490f010d0c36b3c2ebf96b684602a2c35890e
            • Opcode Fuzzy Hash: 523fbcdccefe4602d160f78a08eb89ccf25e4bcfc7e0ec9768cfe376e86c1e98
            • Instruction Fuzzy Hash: 069189B3F206158BF3444D38CC583623693EBE5321F2F82788B59AB7C6D93E9D095284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0c1f79dd780bef4848a19ad6ab56877bc385a1d3ba7bf04759473268893428b4
            • Instruction ID: f1ddfad669fcad8e60258b4c4ebaa4eae109103c21a2d9501c521c2c9b621088
            • Opcode Fuzzy Hash: 0c1f79dd780bef4848a19ad6ab56877bc385a1d3ba7bf04759473268893428b4
            • Instruction Fuzzy Hash: 42817E73F212248BF3484D29CC983A27653DBD5311F2F82788E58AB7C5D97E6D0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cafef7779acd61e7397c3a49aa134bc78a1afb21ceb10ac20829b024b9107e09
            • Instruction ID: ccaa7662f09a487d763c75b4ae70930b9242846fd4c17b6b73acaeb381013be2
            • Opcode Fuzzy Hash: cafef7779acd61e7397c3a49aa134bc78a1afb21ceb10ac20829b024b9107e09
            • Instruction Fuzzy Hash: 0E81D6F390C2049FE7156E2DDC857AABBE9EF98310F1A893DE7C4C3744E93598018696
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 78f7d309a0f3af1f2a4eeb5d1fd4334b0f2840d5d8602549592a1b820d5a7c42
            • Instruction ID: e5c765ac5e33113c332a773fad9183133b7002dfa48a7b5208329da0d66a1f28
            • Opcode Fuzzy Hash: 78f7d309a0f3af1f2a4eeb5d1fd4334b0f2840d5d8602549592a1b820d5a7c42
            • Instruction Fuzzy Hash: 7481ABB3F112258BF3544969DC983A27683DBD4315F2F82788F486B7C6E87E9D095388
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 78579ead3528dff4764a2699bf79c5d8b8b66ccc9513ca446fd7d9993d20b5a2
            • Instruction ID: deacf24c9802ffa875afce79eabbab3d2c8d2f03e7e8dcdaeb14b6d16d633804
            • Opcode Fuzzy Hash: 78579ead3528dff4764a2699bf79c5d8b8b66ccc9513ca446fd7d9993d20b5a2
            • Instruction Fuzzy Hash: 4781E2B3F112218BF3544A29CC983627793DBD5325F3F82388A18AB7C5E97E5C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2c083d3e4b68a27bc738fa0d85cd4f29852a738f27872b6ce7b55dc34bfce015
            • Instruction ID: 1706227c7f3fc24528d1cc88ed8cc8b203d433cb0adc4941ddab5d82475734d3
            • Opcode Fuzzy Hash: 2c083d3e4b68a27bc738fa0d85cd4f29852a738f27872b6ce7b55dc34bfce015
            • Instruction Fuzzy Hash: 8B817D73F116258BF3144E28CCA43A27752DB95710F2F427C8E492B3C5D93E6C1A9784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4bb449cac57a82c3ce731f4f4174cbe22e19fce51991b3c5a4af9f50d02fb781
            • Instruction ID: 6017a2a918c51061f3850138a6d67e8c2a1cfbddc7a3705d91cd0c6d93f3c42e
            • Opcode Fuzzy Hash: 4bb449cac57a82c3ce731f4f4174cbe22e19fce51991b3c5a4af9f50d02fb781
            • Instruction Fuzzy Hash: 66818DB7F112258BF3504979CC8835276929BD5315F2F82788E4CABBCAD93E5D0A93C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e1549c4e29b93394cb388e0d5262cbc940b6d6e8b4b592b9e31a93c3a9050a27
            • Instruction ID: d7d02de9df56dae70f171d7798b429bb696bc12b8d3ed73f5aa5bafaed008c1b
            • Opcode Fuzzy Hash: e1549c4e29b93394cb388e0d5262cbc940b6d6e8b4b592b9e31a93c3a9050a27
            • Instruction Fuzzy Hash: FD81B0B3F112248BF3544D24CC847627293EBD5321F2F42788E28AB3C5D97E9D095784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c92fc1f7083f3966435a3115f3567f84dd039bab93fcfc5143f52b43483e0b74
            • Instruction ID: 9fb8a1c5ee4c50447f9d8b13aa9b3b1849028c92189ead8ac06a7e0680f745ab
            • Opcode Fuzzy Hash: c92fc1f7083f3966435a3115f3567f84dd039bab93fcfc5143f52b43483e0b74
            • Instruction Fuzzy Hash: 8F8149B3F102258BF3544E29CC987A27752EB95321F2F42788E486B3D4D97F6D099788
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 279ebfd7c8e3ec3817e318a91c152954154ea17c112d3842a05429df0bf73b8d
            • Instruction ID: 203241f74125d784c42c2feefe19a550f7c782db3d5055a98da35d7eb419984e
            • Opcode Fuzzy Hash: 279ebfd7c8e3ec3817e318a91c152954154ea17c112d3842a05429df0bf73b8d
            • Instruction Fuzzy Hash: 6B81AEB3E116258BF3104A2ACC987927793ABD4320F3F42788E5C2B7C5D97E5D4A9784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 76a80eee80f310373b1cd8227954816adc49aeca480f90ec999af42cc3d65c5a
            • Instruction ID: c0f14ad28ec9d2a50736d3517254b8aefab274842519cd6bb6b8486354ddcd61
            • Opcode Fuzzy Hash: 76a80eee80f310373b1cd8227954816adc49aeca480f90ec999af42cc3d65c5a
            • Instruction Fuzzy Hash: C4815CB3F215258BF3544D28CC583627683EBD4321F2F82788B59AB7C5D97E9D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e2ea171214b34a1c501d41e9a54836275af4a297fd847f306a79c970bf7f9769
            • Instruction ID: c21ca6a2ec993482d9115c7673577b2ce82e69ec1d537a9a1174d26c1b54a19a
            • Opcode Fuzzy Hash: e2ea171214b34a1c501d41e9a54836275af4a297fd847f306a79c970bf7f9769
            • Instruction Fuzzy Hash: 038156B3F112258BF3544D29CC683626683ABD5324F2F82788FAD6B7C5E93E5C065384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 884766c448437d578d39dcc70c081a225fb2439172f0c01cf908cd566c7558f4
            • Instruction ID: be2965d888ed9d73f6661bf8c86892836d47ec7f8f9c9cece3a23b9f69f7cc2a
            • Opcode Fuzzy Hash: 884766c448437d578d39dcc70c081a225fb2439172f0c01cf908cd566c7558f4
            • Instruction Fuzzy Hash: 88818CB3F216258BF3484E28CC643B23253DB95321F2F427C8A499B7C5D93EAD0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 81b04bb5f1a9ad633266b81ae8c4df865483879bf017f1c4c413c0b06a39157c
            • Instruction ID: 247ccbe4fe9fd5a05f3bd36c5853e7a71b8587f7615f50706c2c239cf9dd2c4b
            • Opcode Fuzzy Hash: 81b04bb5f1a9ad633266b81ae8c4df865483879bf017f1c4c413c0b06a39157c
            • Instruction Fuzzy Hash: 9B818DB3F115258BF3548E29CC543627283EBD5321F2F82788A586B7C9DD3EAC0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: efc621cf432624625a3c2a6b1839e757960c2e0b521f66ce795a1f5ee3257755
            • Instruction ID: 30081c28de6816ab7f9d7d9e5f2f8df08159d30b537118bee03b54fa83fee8ba
            • Opcode Fuzzy Hash: efc621cf432624625a3c2a6b1839e757960c2e0b521f66ce795a1f5ee3257755
            • Instruction Fuzzy Hash: 4481ACF3F116258BF3444978DC983617692DB95311F2F82788F48AB7CAE93E5D099384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 300c78899727f8d4bc71c7f2b1557ef6acc6ea35131f71650731d4b458abcbe4
            • Instruction ID: 21650251f5ca4d542df965d803f1ee4594b61f793aad0c634e5d3b291ebebdf3
            • Opcode Fuzzy Hash: 300c78899727f8d4bc71c7f2b1557ef6acc6ea35131f71650731d4b458abcbe4
            • Instruction Fuzzy Hash: 0C816DB3F2062587F3644939CC543A27682DB94320F2F82788E9DAB7C5D97E9D0A53C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0520d48d202aabee1af08c6c1499aaa5ea0cfbdc4e521e29597cca5a7cf95784
            • Instruction ID: f0c2dcdfe9babf5b1456c2b15693ef0754ed7f0d8db1dfa4de687bcfc1ccba13
            • Opcode Fuzzy Hash: 0520d48d202aabee1af08c6c1499aaa5ea0cfbdc4e521e29597cca5a7cf95784
            • Instruction Fuzzy Hash: 5A81BBB3F112258BF3484978CC98362B692AB95310F2F42788F5CAB7D5D93E5D0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ea33abe97c5cc58104305f9f081d17eb7e588535471aae4a05d86f8f032a01ec
            • Instruction ID: 02189ed1c8ce3ac22fc7d3d1d670c6ba276a6a142e11bee86f5b96d71ce39c4a
            • Opcode Fuzzy Hash: ea33abe97c5cc58104305f9f081d17eb7e588535471aae4a05d86f8f032a01ec
            • Instruction Fuzzy Hash: 03817CB3F116258BF3444E24CC983627683EBD5315F2F82788E586B7C4E97E9D0A9384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cb38d2790a55ec16e4b679dd41febb442918d58643e0a584e4db6ab25d7f20ee
            • Instruction ID: ef8d5e9cba2cff9dd587b4720bad3bdf42820f5a6a00134f0301977284537478
            • Opcode Fuzzy Hash: cb38d2790a55ec16e4b679dd41febb442918d58643e0a584e4db6ab25d7f20ee
            • Instruction Fuzzy Hash: 31815DB3E106258BF3504E69CC98762B692EB95321F2F02788E8C6B7C1D97F6D0957C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b9df30a9b36af81e9e3eddb5de75563adab980aaf8333cfab9ae341ce712c1d7
            • Instruction ID: bda4294bf90dbacef86c3995afa39d52c0e29e060bca68f9d48b398a85343b92
            • Opcode Fuzzy Hash: b9df30a9b36af81e9e3eddb5de75563adab980aaf8333cfab9ae341ce712c1d7
            • Instruction Fuzzy Hash: EB817DB3E112258BF3544E29DC98362B7939B95325F3F42388E5C277C5D93E5C0A56C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2e72d1552899f6d860ee5dcc3287147937472b3ec67daa27de8199baf0cb0ab4
            • Instruction ID: 61cf1609c1b625380fa3dbc6ba0c837f311ae6b5c7530e1ea37a63aa68c681af
            • Opcode Fuzzy Hash: 2e72d1552899f6d860ee5dcc3287147937472b3ec67daa27de8199baf0cb0ab4
            • Instruction Fuzzy Hash: 4E819FB7F107258BF3404E69DC843527792EBA5315F2F41788E88AB3C5E93E6C099784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 913453c7f6f789a4aeafb677a152a53bf5c41550209d4ea90070f5ffc88897c7
            • Instruction ID: 2060bde9796ba04f9b6331e3d9f933104dc492b950c8966329cf55dd7d28537e
            • Opcode Fuzzy Hash: 913453c7f6f789a4aeafb677a152a53bf5c41550209d4ea90070f5ffc88897c7
            • Instruction Fuzzy Hash: 67816DB3F2122587F3544D29CC983627693DBD5320F2F42788E58AB3C5D93E6D0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9133f36f7e083f3404316c9d9a988d5b3111be6efc133c4055ec0381eacce3a2
            • Instruction ID: b5e9a7eeb370a7f4946f3a2b98ce65aeb9b72b1246bbcc2245295856ec43b896
            • Opcode Fuzzy Hash: 9133f36f7e083f3404316c9d9a988d5b3111be6efc133c4055ec0381eacce3a2
            • Instruction Fuzzy Hash: EA8176B3F116258BF3548968CC983627682DBD4311F2F82788F58AB7C5E87E5D0A5388
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e1b4d2ea16fe33403dea4a124d66f9d9388059e2d378364aaf256988bb992eb8
            • Instruction ID: 1ff7f18d4a79032e0f01c33e522144f36ea87b9fdaec2664166c789c53602f71
            • Opcode Fuzzy Hash: e1b4d2ea16fe33403dea4a124d66f9d9388059e2d378364aaf256988bb992eb8
            • Instruction Fuzzy Hash: 948180B3F116158BF3484D39CC583627683DBD5321F2F827C8A59AB7C9D97E6C0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6e0f46e6ef68756aa48ba4ad1b85b86f18290855b8f90647be87e228fe6fadb3
            • Instruction ID: 371dcdc785bda73e6ad21ab6cba273bacd683d30d7891defe13f0ec118028eff
            • Opcode Fuzzy Hash: 6e0f46e6ef68756aa48ba4ad1b85b86f18290855b8f90647be87e228fe6fadb3
            • Instruction Fuzzy Hash: 08818EB3F102258BF3544E29CD583627693DBE5325F2F82788E486B7C5E97E6C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a0443ab524e597ec55570ee49f87c6791ebc0e2c7aeadfce532223498df73a39
            • Instruction ID: a47fd2dfeab68833a163cdc75e249e24e862d20f48761ebb7ac5e58c1104254b
            • Opcode Fuzzy Hash: a0443ab524e597ec55570ee49f87c6791ebc0e2c7aeadfce532223498df73a39
            • Instruction Fuzzy Hash: EF819CB7F112258BF3944D24CC883627292EBD5325F2F82788F586B7C5D93E5D0A5788
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fb695198c9d047c5843a6ff0b70a34174b3edd5832fa40381a932b959c4e2a90
            • Instruction ID: 9578eb776d1509bd15cfbe14edeb078a3aee733eae6f11e9686658121eb8640e
            • Opcode Fuzzy Hash: fb695198c9d047c5843a6ff0b70a34174b3edd5832fa40381a932b959c4e2a90
            • Instruction Fuzzy Hash: AB81B6B3F116208BF3584A39CC983626683DBE5315F2F82788E5D6B7C5E97E5C094384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 41f00ed62fb4cd6116eb7df3ec61c0a6cd370324318068d3b5fa231f03a9feee
            • Instruction ID: 58b411945c18df150d53fe2ad9d025e2dac8642c3185b57a4bb6ec01f9dab945
            • Opcode Fuzzy Hash: 41f00ed62fb4cd6116eb7df3ec61c0a6cd370324318068d3b5fa231f03a9feee
            • Instruction Fuzzy Hash: 218187B3F112258BF3944939CC5836276839BD5321F2F82788E5CABBD9DD3E5D0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1b648e67ba2d508eeeab2624aee5d09e02f2a48807cb1d2c87a538d1cde44275
            • Instruction ID: 073d3ef89465760fc2527485d6fd66de22503010665c5a7e8e376dfb032a7bc7
            • Opcode Fuzzy Hash: 1b648e67ba2d508eeeab2624aee5d09e02f2a48807cb1d2c87a538d1cde44275
            • Instruction Fuzzy Hash: 72714AB3F212258BF3504D29CD983627692DBD5320F2F42788EACAB7C5D93E9D095784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 00659d53856906f237f07580d2ff5527ea3282a298f7599592217d6308332272
            • Instruction ID: 442ba2f6170ba819098d4cb47e416ed41b74a11885e0fae5d42838dd0c2e811f
            • Opcode Fuzzy Hash: 00659d53856906f237f07580d2ff5527ea3282a298f7599592217d6308332272
            • Instruction Fuzzy Hash: 1181BEB3F112258BF7540E29DC983627293EBE4321F2F42388E595B7C9E97E5C0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9aa45844ff27300649cf2e798c6e8f7312044b0b91a117fdd6df2945bb6bc505
            • Instruction ID: 75f6b4099c07011187eba25cd71239c452f6bde0975fb6e0e8afb8be9a8c1325
            • Opcode Fuzzy Hash: 9aa45844ff27300649cf2e798c6e8f7312044b0b91a117fdd6df2945bb6bc505
            • Instruction Fuzzy Hash: 6271ADB3F10A258BF3444978CC983627682DB94324F2F82788F4CAB7C6D97E5D095284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5b4f0effb5cbeb9a49d035378c518d67a07e34a8ee1f6ea5845a6f418324019b
            • Instruction ID: 9e5bddeeac02e11a43ec15cbdd36c7e440b54a2f821c9c25ca3c3aba022d5080
            • Opcode Fuzzy Hash: 5b4f0effb5cbeb9a49d035378c518d67a07e34a8ee1f6ea5845a6f418324019b
            • Instruction Fuzzy Hash: 9571BEB3F112248BF3400A69DC983627692EB95324F2F4278CE586B7D5DA3E6D0997C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 96ffadfe11ea09f8973230f0167b30984a558ab2c04541a8d79dc40255d4287e
            • Instruction ID: f0c1696ade01e5aaa183d4428db5cec826687b8b7d0a3bf1351b221a023c0f0b
            • Opcode Fuzzy Hash: 96ffadfe11ea09f8973230f0167b30984a558ab2c04541a8d79dc40255d4287e
            • Instruction Fuzzy Hash: C471B3B3F506248BF3548D29CC983A17682DB91321F2F427C8F9C6B7C5D83E5D0A5288
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: aa173888f352986c41ac5643e976c9db65ffc40f380762619865d01deb74ca8e
            • Instruction ID: 81c32d9febc14a716b7bac154873686aafd3bdbdbeff200b0e6c8d6c1ba6f7ac
            • Opcode Fuzzy Hash: aa173888f352986c41ac5643e976c9db65ffc40f380762619865d01deb74ca8e
            • Instruction Fuzzy Hash: 827149B3F206248BF3504929CC9836276829BD4325F2F86788E9DAB7C5D97E9C0956C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7480ffea0fafd9a3a3badf1128ff37ef6e8e9e00f4cb3cc64be96df2438864aa
            • Instruction ID: af548f93c83155cfdcc1d057966dcc05e4715f946942121dfebd6e9962a308db
            • Opcode Fuzzy Hash: 7480ffea0fafd9a3a3badf1128ff37ef6e8e9e00f4cb3cc64be96df2438864aa
            • Instruction Fuzzy Hash: 5C717DB3F116344BF3544938CC9836276929B95324F2F8278CE5C6BBDAD87E5D095384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6cfa69bc5a1330e20ebaed100c6ed8687cc25ca466f660170ac02d67fd8e0c1f
            • Instruction ID: d313e20c8f96b74fd2235dd07462024740c51324b90ef373500af6740f6d506c
            • Opcode Fuzzy Hash: 6cfa69bc5a1330e20ebaed100c6ed8687cc25ca466f660170ac02d67fd8e0c1f
            • Instruction Fuzzy Hash: 53719BB7F116258BF3444A19CC943A27293EB95322F2F82788E5C2B7C5E93E5C0A53C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ba2f304284e725e267fa064ee53e30e4572a7c81a72b17877bdae8447c608638
            • Instruction ID: 0def40871b0f6f9c39d216ad4dac2f31d6deac5e0dea8125409eeaeee477346f
            • Opcode Fuzzy Hash: ba2f304284e725e267fa064ee53e30e4572a7c81a72b17877bdae8447c608638
            • Instruction Fuzzy Hash: CA716CB7F5062147F3584929DCA836272839B94725F2F827C8E49AB7C5E87E9C0647C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 45a2ad3b45f1c5ca08afeeaa64914646d8e928c9a5f3771d618699cc5a71649a
            • Instruction ID: 36b90ef4ae14c8e74d1ef1c00aad673cadf8618ccf30788efcbf346f4f419586
            • Opcode Fuzzy Hash: 45a2ad3b45f1c5ca08afeeaa64914646d8e928c9a5f3771d618699cc5a71649a
            • Instruction Fuzzy Hash: CB71BEB3F512258BF3944938CD983627683DBD5321F2F82788E486B7CAE97E5D095384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2ad1e1cb14fb642e0b5de6a6b3d4bc7bb096e68b3d40d19fadef6cea33b3a75c
            • Instruction ID: 7908ac216812056d79b9035988714b7643fa5522f09cf099a983dd643411a310
            • Opcode Fuzzy Hash: 2ad1e1cb14fb642e0b5de6a6b3d4bc7bb096e68b3d40d19fadef6cea33b3a75c
            • Instruction Fuzzy Hash: E97170B3F502204BF3644D29CC983A2B692EB94320F2F42788E9DAB7D5D97E5D0953C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d49c5e41f1aa392258e7bd1992de5f1dc0e809acd9315db8e72edec6f5031062
            • Instruction ID: d42a34f9802318cfaaf0d9883b37796aa05892c21399217267e9cc00ef950b66
            • Opcode Fuzzy Hash: d49c5e41f1aa392258e7bd1992de5f1dc0e809acd9315db8e72edec6f5031062
            • Instruction Fuzzy Hash: A9716AB7F112248BF3504E29CC983A17292EB95321F2F41788E8C6B3C1D97F6D099788
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6e98ef616c6c92061eb55533a78c1f28c6c59809cf4a32f80836385121196e4f
            • Instruction ID: 222c5ae465291a224bc33729cb2303568f6b186b43e5302d03ff9aadd409ea61
            • Opcode Fuzzy Hash: 6e98ef616c6c92061eb55533a78c1f28c6c59809cf4a32f80836385121196e4f
            • Instruction Fuzzy Hash: 087188B3F116258BF3084E68CC943627792EB99310F2F41788B586B3C1DA7EAC059788
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 87355e704aa471255602da66cb41b9ae7cb8dc6e4d4cb9f69d2cb88d6a5a6cf0
            • Instruction ID: 33587f58aecbf8b2a49e9286e6287b5ca8a3c5175e02c7001e71eb456199d559
            • Opcode Fuzzy Hash: 87355e704aa471255602da66cb41b9ae7cb8dc6e4d4cb9f69d2cb88d6a5a6cf0
            • Instruction Fuzzy Hash: B3718CB3E111248BF3504E25CC983A2B692DB95311F2F82788E4C6B7C5D93E6D0A97C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3eecc0d22b8173c76d8f9b7afa81e2c79978d75ae3a447eff84f99b9b1bccfc3
            • Instruction ID: 45a219160dfcf8bf44c2b92a04f0fcc77584f66239d3607222292b400fd4ffc6
            • Opcode Fuzzy Hash: 3eecc0d22b8173c76d8f9b7afa81e2c79978d75ae3a447eff84f99b9b1bccfc3
            • Instruction Fuzzy Hash: 71719DB3F116258BF3544E68CC983627692DB95310F2F4278CF48AB3D4D97EAD0A5788
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6e1e007fe1195c802db1ec3d811bfbc5ceed572fff638836276450754ce394e2
            • Instruction ID: fbb108721ab75d566b9fc03a4d86527f56a007b3ef48243b3d1f105322010777
            • Opcode Fuzzy Hash: 6e1e007fe1195c802db1ec3d811bfbc5ceed572fff638836276450754ce394e2
            • Instruction Fuzzy Hash: 7A718AB3F106158BF3144D39DD983A23683DBD5325F2F82788A58AB7C9D87E5D0A5288
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5859908b25959ed974f12db97898c496dbf90860cb124242877ee6f86219137c
            • Instruction ID: fcbdd8794053c0aa7a2670ff1c5e568ceea203357923ddbec7ddbd7561d5f2f1
            • Opcode Fuzzy Hash: 5859908b25959ed974f12db97898c496dbf90860cb124242877ee6f86219137c
            • Instruction Fuzzy Hash: 8771AEB3F106158BF3444E69CC943627293EBE8315F2F41788E49AB3C5D97EAD0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5cacfe3e1f0ed36d854597a2acbba50e4af9fc0d1c70c799f943ebb68bd07568
            • Instruction ID: aeac540b6abd4f6836494b91a0d00a867381a6fc3b9e3c32a33ac158fdbc093d
            • Opcode Fuzzy Hash: 5cacfe3e1f0ed36d854597a2acbba50e4af9fc0d1c70c799f943ebb68bd07568
            • Instruction Fuzzy Hash: 30719AB3F0022587F3544D69DCA8362B683EBD5318F2B81798F4A6B7C5D93E6C064384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7f4bff6a3d7284605723f3e0c8456680049e4a87b570e69f0af7c3aeecad45f6
            • Instruction ID: aa03686ddc08151c195d0515f4b59ae05811e895e3e741fac74493f662c1b8e1
            • Opcode Fuzzy Hash: 7f4bff6a3d7284605723f3e0c8456680049e4a87b570e69f0af7c3aeecad45f6
            • Instruction Fuzzy Hash: 9C719DB3E111258BF3444E68CC583A27692EB94325F3F42388E5D6B7C5EA7E9C0A57C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 13a58a208932c23079b0f23f40a5af078dbdc3b961c87e1d4944ad1a329a7a09
            • Instruction ID: a5b31b2efdfb1ee6f26a9ea73451d92932bf28f44d28386e9190efc275e1c6c0
            • Opcode Fuzzy Hash: 13a58a208932c23079b0f23f40a5af078dbdc3b961c87e1d4944ad1a329a7a09
            • Instruction Fuzzy Hash: 29719DB7F116258BF3584E39DC983A17682EB94310F2F423C8E899B7C1D97E6D099784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1788a5ca66831bf783f0726ed7b3b6086addfe2dfeede037f90b9cf89b163505
            • Instruction ID: f8e718556c9be052849e4aff3f281b44f4805876d12bbcfaccda8642e6b3b6b4
            • Opcode Fuzzy Hash: 1788a5ca66831bf783f0726ed7b3b6086addfe2dfeede037f90b9cf89b163505
            • Instruction Fuzzy Hash: AE71CFB3E211258BF3944D25CC583B27282DBE5321F2F827C8E99AB7C5D93E5D095784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 36be0268a4dbe3c6388d0a5969c1e0433f774f7452f06c5f03c50c9eb6b86c4f
            • Instruction ID: 20eb0bccf7b1b4abf5e7dc0bcc4e712cf4b7feb5beb232236b05c619f57cbf45
            • Opcode Fuzzy Hash: 36be0268a4dbe3c6388d0a5969c1e0433f774f7452f06c5f03c50c9eb6b86c4f
            • Instruction Fuzzy Hash: B461ACB3F105254BF3544A69CC983A2A693EBD5314F2F82788E4C6BBC9D87E5C0A53C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 939f51c2decf2d55dee7c341ba19ebbe28e0bb16656007ae8428825ed97d0e36
            • Instruction ID: aeeefdf712d93dcee88668cae8eadad1f8414048efef9b5c8aebb6bdd5a5c6d8
            • Opcode Fuzzy Hash: 939f51c2decf2d55dee7c341ba19ebbe28e0bb16656007ae8428825ed97d0e36
            • Instruction Fuzzy Hash: 6171BDB3F112258BF3544E29CC54362B792EB95310F2F817D8A896B3C5D93E6C0A9788
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 09723cad19ad73b41112565edf31c5b650d1d6a589a11a2ac6343cb319034b99
            • Instruction ID: 114a1f46489d35b70f3f04c73b70a8fb264cfbabf3c3602f74d97d1325c244b3
            • Opcode Fuzzy Hash: 09723cad19ad73b41112565edf31c5b650d1d6a589a11a2ac6343cb319034b99
            • Instruction Fuzzy Hash: 67618BB7F116218BF3584D29DC983627683EBE4315F2F827C8E496B7C5D87E6C0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c66d70f40bfcad644290cfe89b1bb922057d642baa5fbfc7f441b715f1a8f498
            • Instruction ID: dff9d175652e1f882c070f7e3bcbf2d633dc8384ff046d4fe23d4662fe50696f
            • Opcode Fuzzy Hash: c66d70f40bfcad644290cfe89b1bb922057d642baa5fbfc7f441b715f1a8f498
            • Instruction Fuzzy Hash: C071AEB3E112258BF3544E25CC983A27643EBD1310F2F427C8E896B7C5D97E5D0AA784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3c0c299134b9e42a7ef35e73b35b56ff06514dcbf97c1c6ae7184fe8212c5047
            • Instruction ID: 4f903fa8d2949e072acb7ed2edcaa92d73e43005454f50a9b7df2b4a67af030f
            • Opcode Fuzzy Hash: 3c0c299134b9e42a7ef35e73b35b56ff06514dcbf97c1c6ae7184fe8212c5047
            • Instruction Fuzzy Hash: 6D619AB3F216248BF3444A29CC44362B353EBD5311F2F82788E586B3D9D93EAD0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 86e07ad805f08a40b327f57c03f709c04081b05c860f4b15ee1eaf01cc36a022
            • Instruction ID: f1b218a91d3948e16c818a0120f6e822a61599ac402c9daa01ccd79d3f129ff8
            • Opcode Fuzzy Hash: 86e07ad805f08a40b327f57c03f709c04081b05c860f4b15ee1eaf01cc36a022
            • Instruction Fuzzy Hash: 9871AEB3E1122687F3444D29DC983627653EBE5321F3F82388E586B7C5E93E5D0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ba375bc861d25b1b7e296d9cecf8c70201a02cd9030b5f3471b9f198c4f9ca8b
            • Instruction ID: 29e11bb870667570e17b386da8ef5cf2d395299f39d63e4be87c15a53a685668
            • Opcode Fuzzy Hash: ba375bc861d25b1b7e296d9cecf8c70201a02cd9030b5f3471b9f198c4f9ca8b
            • Instruction Fuzzy Hash: CE6138B3F116258BF3544939CC583627693EBD5310F2F82388E9CAB7C5D93E9D0A5684
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d30f9e33ca02a1961a18696e0c19a1ef1386624fa6fac318e1224f8582e50810
            • Instruction ID: e70de9c4257929fdf6410b3b1687760de82b29e464dd61ec89919eb322fb9288
            • Opcode Fuzzy Hash: d30f9e33ca02a1961a18696e0c19a1ef1386624fa6fac318e1224f8582e50810
            • Instruction Fuzzy Hash: D0615BB3F116208BF3508D29CC883927653DBD5314F2F82788E4C6B7C5D97E5D0A9684
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fd882cb2f86fb9baa8e4e259a32d5db1ec9931deca31a1fc912c3137ff969c5f
            • Instruction ID: e87b893f1a01da3fdc4def08f7ebea85aced1c1876f4d1798a8815f4a7e4782a
            • Opcode Fuzzy Hash: fd882cb2f86fb9baa8e4e259a32d5db1ec9931deca31a1fc912c3137ff969c5f
            • Instruction Fuzzy Hash: 42619AB3F202258BF3584D78DCA83727682EB95314F2F427C8E4AAB3C5D97E1D095284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9afcad97eeecb15aef4301a60f2c1555e4bff45ae84d6cd77f57a5c6013cb762
            • Instruction ID: b617c371299a36d83a793ce5e23465c43665f597dfd50a316ffb48a539cbae03
            • Opcode Fuzzy Hash: 9afcad97eeecb15aef4301a60f2c1555e4bff45ae84d6cd77f57a5c6013cb762
            • Instruction Fuzzy Hash: 0D6159B3F206258BF3544929CD983627682EB95311F2F82388F5CAB7C5D87E9D0A57C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 197550683deb909d63897a19c7a1586276dcfe60628120a577b2ddf83fb5a9c3
            • Instruction ID: 98a9ff50db5f9b95b05b66c106acfe4bf1588b0b7bc79430f5fdf4b24f8e471b
            • Opcode Fuzzy Hash: 197550683deb909d63897a19c7a1586276dcfe60628120a577b2ddf83fb5a9c3
            • Instruction Fuzzy Hash: E461BFB7F116268BF3544928CC583A276829BE4311F3F427D8E8DAB3C5E93E5C065384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 498c544d8d03a2360ab6831410f284f874c1d4d27d434b516c86b02b8e933b74
            • Instruction ID: 2a2dae0a48d4a35c2a7ae1b726e7997e61abf5467a4ab69601468fefd3fdfbd4
            • Opcode Fuzzy Hash: 498c544d8d03a2360ab6831410f284f874c1d4d27d434b516c86b02b8e933b74
            • Instruction Fuzzy Hash: E661BFB3F206258BF3944D78CC883A27692DB94311F2F8238CF48AB7C5D97E9D495284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f393cc6b66a7b04c27dac8578744c142303c6881f2b7fbd95e87c4b0e18fc71e
            • Instruction ID: 0911d23ee7e748e75a653710daa2ce242c47cf0071d62157c935d628bdaf6cdb
            • Opcode Fuzzy Hash: f393cc6b66a7b04c27dac8578744c142303c6881f2b7fbd95e87c4b0e18fc71e
            • Instruction Fuzzy Hash: 945149F3F2152547F3548929CC983A27693DBD5315F2F82788E48AB7C8E93E9D0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1226acdac0ccd14ad507846441053f742bc3a523e466199fc91179c1adff1196
            • Instruction ID: 93fb989174a183cbf7d8314fd2e9c56048c7b088077a99f1b1da52f20629e0da
            • Opcode Fuzzy Hash: 1226acdac0ccd14ad507846441053f742bc3a523e466199fc91179c1adff1196
            • Instruction Fuzzy Hash: 31519BB3E116258BF3544E29CC943627793DBD9311F2F42BC8E496B7C4E93E6C199284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8bf548361068156c0b87fedfe7df65bb1f0468d5bb44cbe90d8e13c573c54bfa
            • Instruction ID: d3420b5ea30b7bba199525c3b7d6ad80af6759fb5903afdf7281dce4bafb2e52
            • Opcode Fuzzy Hash: 8bf548361068156c0b87fedfe7df65bb1f0468d5bb44cbe90d8e13c573c54bfa
            • Instruction Fuzzy Hash: 0251A1B3F506248BF3444979DC993626683EBD4320F2F81388B599B7C9DC7E9C0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7f53311ab8d94a8b6fb2baf567af0ec654b81946076934333645de1b43c115e8
            • Instruction ID: a3f80ebcc4bb7d96b60fac227024bfc2fdf602dcf026db2a5265520edd27214e
            • Opcode Fuzzy Hash: 7f53311ab8d94a8b6fb2baf567af0ec654b81946076934333645de1b43c115e8
            • Instruction Fuzzy Hash: EC51A1B3F615298BF3544929CD583A23683DBD5311F2F827C8E089B7D5D93EAD0A6384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2c8643fa82127c5acc5d39c303b1ff1ec64c4beb01669d439d2e34afa60e2541
            • Instruction ID: bf0e1dc7f92bfc18ed0168cd0d9c71538d46ad1445ad1477e9549a7e0c1b517b
            • Opcode Fuzzy Hash: 2c8643fa82127c5acc5d39c303b1ff1ec64c4beb01669d439d2e34afa60e2541
            • Instruction Fuzzy Hash: 2151C3B3F106248BF3544E29CC943A27292EBA9321F2F427C8F596B7C5E97E5C095384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9a713dcb832ad063c45343166b461a99eb80b67d6490f52a241115e592ef8366
            • Instruction ID: bf101b57f876974848af5b90331e55b2d42046b22dbb4c70c236159e6fde977a
            • Opcode Fuzzy Hash: 9a713dcb832ad063c45343166b461a99eb80b67d6490f52a241115e592ef8366
            • Instruction Fuzzy Hash: A5518FB7F5162687F3544929CC583A272829BE4714F3F42788E8DAB7C5E93E5C0A53C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5c91593a163e0b4b69f5c12ca883a9785082492a729ebd6539b1c8209c9fb02c
            • Instruction ID: 40ef097154108c6eb34165ae6e0da06936078b345b887a8e33e121013bd3f985
            • Opcode Fuzzy Hash: 5c91593a163e0b4b69f5c12ca883a9785082492a729ebd6539b1c8209c9fb02c
            • Instruction Fuzzy Hash: 5B51D0B3F106248BF3404A79CC983626693EBD1310F2F81798B989B7C6D97E9C0A5384
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fa8bde20870bfae8dbf5a0488049a652c107303b33b6a2b6aab9dc4eee6580bf
            • Instruction ID: 85551d6be24c7a575b1f9526c2174f4347dbc582f64273bd052cf38cba0b7691
            • Opcode Fuzzy Hash: fa8bde20870bfae8dbf5a0488049a652c107303b33b6a2b6aab9dc4eee6580bf
            • Instruction Fuzzy Hash: EE51AAB3E116258BF3584D39CC983667683EBD0320F2F827C8E99677C5D97E1D095288
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 56296ce9455a3442196222bd6fc6374fb89db27a8e40caa8c8aaddbc0747ba75
            • Instruction ID: 1af38f75f31f2007894fda1c555f169c559c4e8dfdd0696c7b7df3e9d254f9a5
            • Opcode Fuzzy Hash: 56296ce9455a3442196222bd6fc6374fb89db27a8e40caa8c8aaddbc0747ba75
            • Instruction Fuzzy Hash: 57518CB3F116258BF3444E28CC543627653DBD5321F2F42788B59AB7C9D93EAC0A5788
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e99b897d8327e03231d0d7b03876afae08d93f95cfe2dbf835579bdeba5c4497
            • Instruction ID: aa28bd1341bb93fbb7bd023f0e6c07e3878b99c83514d506542e14f7343e6478
            • Opcode Fuzzy Hash: e99b897d8327e03231d0d7b03876afae08d93f95cfe2dbf835579bdeba5c4497
            • Instruction Fuzzy Hash: A45167B7F512258BF3804E25DC983627642DBE5314F2F8278CE486B3C9D87E6C0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e683d5d96dbd5839bb4099da51caa8f9e44e4901539c86dbc684f21a092b567b
            • Instruction ID: 4b6cf2d9a7a065777f1323948861cfdfb74e75b6e6eacf1d40ff62a32ed31a20
            • Opcode Fuzzy Hash: e683d5d96dbd5839bb4099da51caa8f9e44e4901539c86dbc684f21a092b567b
            • Instruction Fuzzy Hash: F651E8B3F211258BF3904E29CC483623693DB95314F2F46788E586B7C5D97E9D0953C8
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c4cc70f1f057ca261260e518706cbcf7a3c40d83a0e9238d5606f7397d07979d
            • Instruction ID: 7be5d43effb3d95556da2c64dcd46a8ca00558c017e35670a2717aee69465b93
            • Opcode Fuzzy Hash: c4cc70f1f057ca261260e518706cbcf7a3c40d83a0e9238d5606f7397d07979d
            • Instruction Fuzzy Hash: 9C516CF3F5062187F3148925DC983626683DBD8315F2F81788F886BBC9D87E5C0A5284
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cdd29b9ceaa51fb83c7012e0af5cbfd868ecccc321873d7bfc4da3a572b00a9a
            • Instruction ID: 824c1da487746efcb3120c8575162ea6ab2b6ed86adaab4eebd35dbe1a99e0ce
            • Opcode Fuzzy Hash: cdd29b9ceaa51fb83c7012e0af5cbfd868ecccc321873d7bfc4da3a572b00a9a
            • Instruction Fuzzy Hash: 4851AFA7F106148FF3444E28CC983623652EB96314F2F4278CB599B7E5D97E9D0A9388
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fadb7977c80ef61968e92f3a0ddd956f66ce74ae84a5aba935d92e07d4fe0a05
            • Instruction ID: b2a0e4dea5b976bd88b6846d44402844594ee466272cf808bf2991966b0b44cf
            • Opcode Fuzzy Hash: fadb7977c80ef61968e92f3a0ddd956f66ce74ae84a5aba935d92e07d4fe0a05
            • Instruction Fuzzy Hash: 34518B73B212158BF3548E38CC987623792EB89310F3F427C8A199B7D4D93EAD199784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5d2cbc23c339d297a66c912339f46b92910dade81aeea55bb11a35b20bf086d1
            • Instruction ID: e15a9b612eeffa80caf3a3398873753338858e031f9a91bb00ae020c41e460cb
            • Opcode Fuzzy Hash: 5d2cbc23c339d297a66c912339f46b92910dade81aeea55bb11a35b20bf086d1
            • Instruction Fuzzy Hash: 135170B3F116258BF3544E28CC987627792EB98311F1F467C8E48AB3C5D97E6C099784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 79870aa1bc5730c16c72ee08704471de804adad37938f8f065969c2415a6db72
            • Instruction ID: e24b7df1fcae887d3c9f95af5b95931167acae00a22ec14657806a9d729215fd
            • Opcode Fuzzy Hash: 79870aa1bc5730c16c72ee08704471de804adad37938f8f065969c2415a6db72
            • Instruction Fuzzy Hash: 3B5172B3F112218BF3944E68CC893527693DBD4311F2F82788A48AB7C8D97DAD095784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 659e0cf3b2480b3c1946fe85c053417f1c7750cf88a0d45f83a2ebc1fac907fa
            • Instruction ID: 83d1dc765e944829a79b66890c36d36625eabfd62dccf418111fa5c6af9f4a69
            • Opcode Fuzzy Hash: 659e0cf3b2480b3c1946fe85c053417f1c7750cf88a0d45f83a2ebc1fac907fa
            • Instruction Fuzzy Hash: 1F519FB3F105248BF3544939CC983A26693EBD5310F2F82398B599BBC9DD7E9C0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fe64eb537eb7d0b6b106169d9b4784d7bb4a9ed5ffdbe47b854734d91a311e31
            • Instruction ID: 1baa351176f2b621892400988217fd21aaa97e3300eca760f3e190c038ec4a77
            • Opcode Fuzzy Hash: fe64eb537eb7d0b6b106169d9b4784d7bb4a9ed5ffdbe47b854734d91a311e31
            • Instruction Fuzzy Hash: 77419FB3F115248BF3444939CC983626683EBD5310F2F82798B599B7C9DD7E9C0A5784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 91a7bdb33114f30262547b899be62f18b1e5253c78702c8defb107262520eb5a
            • Instruction ID: 483e9ac1912bdbf81e2db477088c9a81549f9490b858bd3c7ec14c437f84c9eb
            • Opcode Fuzzy Hash: 91a7bdb33114f30262547b899be62f18b1e5253c78702c8defb107262520eb5a
            • Instruction Fuzzy Hash: B8417BB7F002358BF3644979DC98362B6929B95311F2F43788E6C6B7C9D87D5D0A42C4
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2602bd70e8728c66e23f7ff78bcd7d9dd8912eaa715f7e6d935ec0cb3ec3cb2f
            • Instruction ID: 57c01fb21039db6f1d2763e2aa6992d8eef9d9a5581a07a7fadce44a8e3bbdf6
            • Opcode Fuzzy Hash: 2602bd70e8728c66e23f7ff78bcd7d9dd8912eaa715f7e6d935ec0cb3ec3cb2f
            • Instruction Fuzzy Hash: 04419CB3F126248BF3504D29CC983526283DBD5321F3F827889A86B3C5E97E5C0A9784
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9158c80117b2e827d110f1460f0485c06f4c5e405f5921f9e34b8c96a0ff68b9
            • Instruction ID: 7fab9a4ea174ee36f906fab4da6b5a257eb7253c279da55a2ec85eaf1fb3ec4d
            • Opcode Fuzzy Hash: 9158c80117b2e827d110f1460f0485c06f4c5e405f5921f9e34b8c96a0ff68b9
            • Instruction Fuzzy Hash: 2431B1B3F114258BF3548D29CC98762B283DBD5311F2F82798A18AB7C4D87EAC499780
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 144af5b6d7c79796690e3c588e25b8dd0c9b0b60f9ef4a3a52ba507c7fe46a93
            • Instruction ID: c82e7f99246d9819e58095314f8f8c155864ba97a1dbd20adbda516fc2900bdd
            • Opcode Fuzzy Hash: 144af5b6d7c79796690e3c588e25b8dd0c9b0b60f9ef4a3a52ba507c7fe46a93
            • Instruction Fuzzy Hash: 63310BF251C600AFE305BF29D8856AAFBE5FF98710F168C2DE6C8C3640D63098408B97
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 99777414f1913481935a7719d6ea1e106f39604ad905abb7fbac440119c6d83f
            • Instruction ID: ac7f32136e23f7e4c236862b5fbf68164ca5147a177bb555a831550e5864198b
            • Opcode Fuzzy Hash: 99777414f1913481935a7719d6ea1e106f39604ad905abb7fbac440119c6d83f
            • Instruction Fuzzy Hash: 312147B7E606318BF3944928CC8975262429BA5325F2F82788F6C6B3C5DC3E5C0A52C4
            Memory Dump Source
            • Source File: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9c9b5fadcff6fc1b6333f2045a5fcfbe11ec3f7d18c2f0a438c4e6aacca40780
            • Instruction ID: 082b4fd57fed1769b9006e205b6e9b322f4e6cb11cfcb06b4efda431eea04361
            • Opcode Fuzzy Hash: 9c9b5fadcff6fc1b6333f2045a5fcfbe11ec3f7d18c2f0a438c4e6aacca40780
            • Instruction Fuzzy Hash: 85014FA644E3D24FC31387344CA49917FB0AD2311534A02DBC581CB1A3E208994AD762
            Memory Dump Source
            • Source File: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 656a4efc1c63359b9bbfbe1b93d72374bb7d63683cf1494d436a9f7248878479
            • Instruction ID: 157b420cc74f8684ba47f24ccb329a446c482b0d6d2bbcd32ff6281cf0452dac
            • Opcode Fuzzy Hash: 656a4efc1c63359b9bbfbe1b93d72374bb7d63683cf1494d436a9f7248878479
            • Instruction Fuzzy Hash: 6D0129B290C6109BE311FE5ADCC16ABF7E6EF98310F06882DD6D493610E630A8018A97
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: 8$</Download>$</Update>$</xCommand>$<Download>$<Update>$<xCommand$Param$URL$Version
            • API String ID: 0-954089795
            • Opcode ID: 691ee2edf4af6776942d29cbf2e5881f73f70abf8b28773798784accf01272c1
            • Instruction ID: 2d68e6c41ca87c00c381124143961c125374000113fd64c2ef600be50ae681ef
            • Opcode Fuzzy Hash: 691ee2edf4af6776942d29cbf2e5881f73f70abf8b28773798784accf01272c1
            • Instruction Fuzzy Hash: 0012ED71900208EFDB14DFE0DE49BDDBBB5BB48305F208179E502BB2A4DB795A49CB58
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: RO$C$Once$Start
            • API String ID: 0-2962527757
            • Opcode ID: 38f2c482234380c5ccf5e47192bcb562df34f22c8bdb2e96fe65b30f76930fc4
            • Instruction ID: 2a7bed8e637f556c1a294a0d9af7fafa12270aafcab1a65859bb43c9b5deaf43
            • Opcode Fuzzy Hash: 38f2c482234380c5ccf5e47192bcb562df34f22c8bdb2e96fe65b30f76930fc4
            • Instruction Fuzzy Hash: 24D1DC75900208EFDB04DFE4DD89BDE7BB9FB48305F108529F606B61A0DB745A45CBA8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.3234822215.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.3234739267.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234902430.000000000041D000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3234990952.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235108398.0000000000420000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000422000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.000000000066C000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3235152277.0000000000679000.00000040.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.3236285755.00000000008A0000.00000020.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_avx_Cracked.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID: %systemroot%$\??\$\SystemRoot\$\\?\
            • API String ID: 0-1311169778
            • Opcode ID: 8b5b65525cf323457cd06075d39e7c1bde9f6f91a6c07b5f569d8b5f78ef97a4
            • Instruction ID: 3cf452ae6fb0dfcbcd02110e459b44aaa686f69a821e3f1c8313cc58adc2f9c6
            • Opcode Fuzzy Hash: 8b5b65525cf323457cd06075d39e7c1bde9f6f91a6c07b5f569d8b5f78ef97a4
            • Instruction Fuzzy Hash: 8F214B70A54209BBCB04EB54CC82FEFBB79AB54710F204327B611B72D4DEB45945CAD4