Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
Analysis ID:1464091
MD5:80ab4901e0e9519b8d3a6b774a822f8b
SHA1:65933df4128e1bb5aac049c535c784fb16e4b34e
SHA256:407fa06249007223b302b481a49e1abaf8a10fe3409e6812c6f2fc9ff9e29582
Tags:exe
Infos:

Detection

PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains potential unpacker
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • cvchost.exe (PID: 5736 cmdline: "C:\Users\user\AppData\Local\cvchost.exe" MD5: 80AB4901E0E9519B8D3A6B774A822F8B)
    • InstallUtil.exe (PID: 676 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • cvchost.exe (PID: 6816 cmdline: "C:\Users\user\AppData\Local\cvchost.exe" MD5: 80AB4901E0E9519B8D3A6B774A822F8B)
    • InstallUtil.exe (PID: 2516 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.3384646842.0000000000502000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000006.00000002.3337708568.0000000005326000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      00000006.00000002.3337708568.00000000050F6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000005.00000002.3296837065.00000000084D5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000006.00000002.3337708568.0000000005B7C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Click to see the 32 entries
            SourceRuleDescriptionAuthorStrings
            6.2.cvchost.exe.4054338.4.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
              5.2.cvchost.exe.854bd78.12.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                6.2.cvchost.exe.5b7c898.15.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  6.2.cvchost.exe.50f6660.12.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    6.2.cvchost.exe.50f6660.12.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                      Click to see the 44 entries

                      System Summary

                      barindex
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\cvchost.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, ProcessId: 4068, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cvchost
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeAvira: detected
                      Source: C:\Users\user\AppData\Local\cvchost.exeAvira: detection malicious, Label: TR/AD.GenSteal.oztov
                      Source: C:\Users\user\AppData\Local\cvchost.exeReversingLabs: Detection: 63%
                      Source: C:\Users\user\AppData\Local\cvchost.exeVirustotal: Detection: 76%Perma Link
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeReversingLabs: Detection: 63%
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeVirustotal: Detection: 76%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Local\cvchost.exeJoe Sandbox ML: detected
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeJoe Sandbox ML: detected
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000037D3000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2707691705.0000000007890000.00000004.08000000.00040000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000037D3000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2707691705.0000000007890000.00000004.08000000.00040000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h5_2_05901930
                      Source: global trafficTCP traffic: 192.168.2.5:62155 -> 185.125.50.121:56001
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                      Source: unknownTCP traffic detected without corresponding DNS query: 185.125.50.121
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000037D3000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3337708568.00000000054AC000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                      Source: InstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dll
                      Source: InstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exe
                      Source: InstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000004.00000002.3477514753.00000000031F2000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000008.00000002.3469069611.00000000030D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000008.00000002.3469069611.00000000030D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354
                      Source: InstallUtil.exe, 00000004.00000002.3477514753.00000000031F2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot

                      System Summary

                      barindex
                      Source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6adc898.17.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeCode function: 0_2_01A61E700_2_01A61E70
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeCode function: 0_2_07EB3C600_2_07EB3C60
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeCode function: 0_2_07EB3C5D0_2_07EB3C5D
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeCode function: 0_2_07EECA700_2_07EECA70
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeCode function: 0_2_07EED2400_2_07EED240
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeCode function: 0_2_07EEC6E00_2_07EEC6E0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_014E1AE24_2_014E1AE2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_014E4BF84_2_014E4BF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_014E47914_2_014E4791
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_014E1E484_2_014E1E48
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_014E56204_2_014E5620
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_014E1E3A4_2_014E1E3A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_014E56304_2_014E5630
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_05735D284_2_05735D28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_057369404_2_05736940
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_0573EB2E4_2_0573EB2E
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_057335C04_2_057335C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_057335A04_2_057335A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_057336364_2_05733636
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_057336F64_2_057336F6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_057336D64_2_057336D6
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_057331B04_2_057331B0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_057360704_2_05736070
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_05760D904_2_05760D90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_057619E84_2_057619E8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_057619DA4_2_057619DA
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 5_2_059020305_2_05902030
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 5_2_059020405_2_05902040
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 5_2_05901D885_2_05901D88
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 5_2_05901D795_2_05901D79
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 5_2_0778CA705_2_0778CA70
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 5_2_0778D2405_2_0778D240
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 5_2_0778C6E05_2_0778C6E0
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 5_2_07D52F305_2_07D52F30
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 5_2_07D52F275_2_07D52F27
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 6_2_06F9D2406_2_06F9D240
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 6_2_06F9CA706_2_06F9CA70
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 6_2_06F9C6E06_2_06F9C6E0
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 6_2_07162F306_2_07162F30
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 6_2_07162F296_2_07162F29
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_00AC1AE27_2_00AC1AE2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_00AC4BF87_2_00AC4BF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_00AC46A87_2_00AC46A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_00AC46D27_2_00AC46D2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_00AC56207_2_00AC5620
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_00AC1E3A7_2_00AC1E3A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_00AC56307_2_00AC5630
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_00AC1E487_2_00AC1E48
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_04AE5D287_2_04AE5D28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_04AE69407_2_04AE6940
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_04AE35C07_2_04AE35C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_04AE35D07_2_04AE35D0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_04AE60707_2_04AE6070
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_04C10D907_2_04C10D90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_04C119E87_2_04C119E8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 7_2_04C119E27_2_04C119E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F31AE28_2_02F31AE2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F34BF88_2_02F34BF8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F31E488_2_02F31E48
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F356308_2_02F35630
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F31E3A8_2_02F31E3A
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F356208_2_02F35620
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F346258_2_02F34625
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F324F48_2_02F324F4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F324DA8_2_02F324DA
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F324B58_2_02F324B5
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F324A08_2_02F324A0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F324898_2_02F32489
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F324728_2_02F32472
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F324588_2_02F32458
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_02F3250C8_2_02F3250C
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_055F69408_2_055F6940
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_055F5D288_2_055F5D28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_055F31A18_2_055F31A1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_055F60708_2_055F6070
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_055F36228_2_055F3622
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_055F36C28_2_055F36C2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_055F36E28_2_055F36E2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_05620D908_2_05620D90
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 8_2_056219E88_2_056219E8
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000037D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000037D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHdzgjy.exe" vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2701165050.00000000070C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameEcudmt.dll" vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2676535036.0000000004B55000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEcudmt.dll" vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2676535036.0000000004651000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameEcudmt.dll" vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2707691705.0000000007890000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.Win32.TaskScheduler.dll\ vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.0000000003651000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2671940563.000000000178E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeBinary or memory string: OriginalFilenameresultconcentrate.exeD vs SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6adc898.17.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, -.csCryptographic APIs: 'CreateDecryptor'
                      Source: cvchost.exe.0.dr, -.csCryptographic APIs: 'CreateDecryptor'
                      Source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6adc898.17.raw.unpack, -.csCryptographic APIs: 'CreateDecryptor'
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@9/5@0/1
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeFile created: C:\Users\user\AppData\Local\cvchost.exeJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\222B32C777
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeReversingLabs: Detection: 63%
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeVirustotal: Detection: 76%
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Local\cvchost.exe "C:\Users\user\AppData\Local\cvchost.exe"
                      Source: unknownProcess created: C:\Users\user\AppData\Local\cvchost.exe "C:\Users\user\AppData\Local\cvchost.exe"
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeStatic file information: File size 2801152 > 1048576
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2ab400
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdbSHA256e source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000037D3000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2707691705.0000000007890000.00000004.08000000.00040000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: C:\Users\dahall\Documents\GitHubRepos\TaskScheduler\TaskService\obj\Release\net40\Microsoft.Win32.TaskScheduler.pdb source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000037D3000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2707691705.0000000007890000.00000004.08000000.00040000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdbSHA256}Lq source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, -.cs.Net Code: _E001 System.Reflection.Assembly.Load(byte[])
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                      Source: cvchost.exe.0.dr, -.cs.Net Code: _E001 System.Reflection.Assembly.Load(byte[])
                      Source: cvchost.exe.0.dr, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.76b0000.20.raw.unpack, TypeModel.cs.Net Code: TryDeserializeList
                      Source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.76b0000.20.raw.unpack, ListDecorator.cs.Net Code: Read
                      Source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.76b0000.20.raw.unpack, TypeSerializer.cs.Net Code: CreateInstance
                      Source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.76b0000.20.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateInstance
                      Source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.76b0000.20.raw.unpack, TypeSerializer.cs.Net Code: EmitCreateIfNull
                      Source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6adc898.17.raw.unpack, -.cs.Net Code: _E001 System.Reflection.Assembly.Load(byte[])
                      Source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6adc898.17.raw.unpack, -.cs.Net Code: _E009 System.Reflection.Assembly.Load(byte[])
                      Source: Yara matchFile source: 6.2.cvchost.exe.4054338.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.50f6660.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.50f6660.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.5146680.11.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.61466a0.15.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.392bc98.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.372d364.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.5146680.11.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6056660.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.60a6680.14.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.2836244.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.2909c7c.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.53266c0.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.7f01038.11.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.51e66a0.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.2909c7c.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.75e0000.19.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6056660.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.60a6680.14.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.392bc98.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.62866c0.13.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.372d364.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.5074338.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.480a010.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000006.00000002.3337708568.0000000005326000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3337708568.00000000050F6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2705835929.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3336111454.0000000004054000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3337708568.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3337708568.0000000005146000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3296837065.0000000007E61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2686932880.0000000005F91000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2673795300.0000000003651000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3242527529.00000000047F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3322490075.0000000002631000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3242527529.0000000004B65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2676535036.0000000004DEE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe PID: 4068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cvchost.exe PID: 5736, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cvchost.exe PID: 6816, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeCode function: 0_2_07ED3DA9 push esp; ret 0_2_07ED3DAF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_014E37EE push 8BD88B71h; retf 4_2_014E37F4
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 4_2_0573E01A push 3005B388h; retf 4_2_0573E025
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 5_2_07773DA9 push esp; ret 5_2_07773DAF
                      Source: C:\Users\user\AppData\Local\cvchost.exeCode function: 6_2_06F83DA9 push esp; ret 6_2_06F83DAF
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeFile created: C:\Users\user\AppData\Local\cvchost.exeJump to dropped file
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run cvchostJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run cvchostJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe PID: 4068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cvchost.exe PID: 5736, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: cvchost.exe PID: 6816, type: MEMORYSTR
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.0000000003651000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.0000000002631000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL0SELECT * FROM WIN32_BIOS8UNEXPECTED WMI QUERY FAILURE
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeMemory allocated: 1A60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeMemory allocated: 3650000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeMemory allocated: 1C00000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeMemory allocated: 5F90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeMemory allocated: 6F90000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 14E0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 3190000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 1660000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 18A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 3380000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 5380000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 5E20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 6E20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 7E60000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 7470000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 23F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 2630000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 23F0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 5030000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeMemory allocated: 6030000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: AC0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 25B0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 23D0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 2EF0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 3070000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 5070000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe TID: 5908Thread sleep count: 43 > 30Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe TID: 5908Thread sleep time: -43000s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe TID: 4688Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exe TID: 7040Thread sleep count: 43 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exe TID: 7040Thread sleep time: -43000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exe TID: 5604Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exe TID: 4788Thread sleep count: 43 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exe TID: 4788Thread sleep time: -43000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exe TID: 7004Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 3060Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2284Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2701165050.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2676535036.0000000004B55000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2676535036.0000000004651000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3267363349.0000000006321000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3267363349.0000000006821000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3267363349.0000000005E21000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3242527529.0000000004565000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3242527529.00000000047F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VirtualMachineState
                      Source: cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SerialNumber0VMware|VIRTUAL|A M I|XenDselect * from Win32_ComputerSystem
                      Source: cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: model0Microsoft|VMWare|Virtual
                      Source: InstallUtil.exe, 00000004.00000002.3473536553.000000000131E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeQueries volume information: C:\Users\user\AppData\Local\cvchost.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeQueries volume information: C:\Users\user\AppData\Local\cvchost.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\cvchost.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 5.2.cvchost.exe.854bd78.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.5b7c898.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6d886b8.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.InstallUtil.exe.49f0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6d886b8.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.45655b0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.854bd78.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.4b55590.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.485d610.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.70c0000.18.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.70c0000.18.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.InstallUtil.exe.500000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.485d610.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.5b7c898.15.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.InstallUtil.exe.49f0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6adc898.17.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.45655b0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.4832030.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.4655570.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.4b55590.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.480a010.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.4655570.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.4425590.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.3384646842.0000000000502000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3296837065.00000000084D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3337708568.0000000005B7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2701165050.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3267363349.0000000006321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2676535036.0000000004B55000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3267363349.0000000005E21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2676535036.0000000004651000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.3395117407.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3242527529.0000000004565000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2686932880.0000000006851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3267363349.0000000006821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3242527529.00000000047F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6adc898.17.raw.unpack, type: UNPACKEDPE
                      Source: InstallUtil.exe, 00000004.00000002.3477514753.00000000031F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Electrum
                      Source: InstallUtil.exe, 00000004.00000002.3477514753.00000000031DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Jaxx Liberty@fihkakfobkmkjojpchpfgcmhfjnmnfpi
                      Source: InstallUtil.exe, 00000004.00000002.3477514753.00000000031F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Exodus
                      Source: InstallUtil.exe, 00000004.00000002.3477514753.00000000031F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
                      Source: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2701165050.00000000070C0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 5.2.cvchost.exe.854bd78.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.5b7c898.15.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6d886b8.16.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.InstallUtil.exe.49f0000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6d886b8.16.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.45655b0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.854bd78.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.4b55590.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.485d610.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.70c0000.18.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.70c0000.18.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.InstallUtil.exe.500000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.485d610.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 6.2.cvchost.exe.5b7c898.15.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.InstallUtil.exe.49f0000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6adc898.17.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.45655b0.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.4832030.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.4655570.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.4b55590.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.480a010.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.4655570.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 5.2.cvchost.exe.4425590.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000007.00000002.3384646842.0000000000502000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3296837065.00000000084D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000006.00000002.3337708568.0000000005B7C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2701165050.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3267363349.0000000006321000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2676535036.0000000004B55000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3267363349.0000000005E21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2676535036.0000000004651000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.3395117407.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3242527529.0000000004565000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2686932880.0000000006851000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3267363349.0000000006821000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000005.00000002.3242527529.00000000047F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe.6adc898.17.raw.unpack, type: UNPACKEDPE
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                      Windows Management Instrumentation
                      1
                      Registry Run Keys / Startup Folder
                      11
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping211
                      Security Software Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/Job1
                      DLL Side-Loading
                      1
                      Registry Run Keys / Startup Folder
                      1
                      Disable or Modify Tools
                      LSASS Memory41
                      Virtualization/Sandbox Evasion
                      Remote Desktop Protocol1
                      Data from Local System
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                      DLL Side-Loading
                      41
                      Virtualization/Sandbox Evasion
                      Security Account Manager13
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                      Obfuscated Files or Information
                      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                      Software Packing
                      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 1464091 Sample: SecuriteInfo.com.Trojan.Inj... Startdate: 28/06/2024 Architecture: WINDOWS Score: 100 30 Malicious sample detected (through community Yara rule) 2->30 32 Antivirus / Scanner detection for submitted sample 2->32 34 Multi AV Scanner detection for submitted file 2->34 36 7 other signatures 2->36 6 SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe 1 5 2->6         started        10 cvchost.exe 3 2->10         started        12 cvchost.exe 2 2->12         started        process3 file4 22 C:\Users\user\AppData\Local\cvchost.exe, PE32 6->22 dropped 24 C:\Users\user\...\cvchost.exe:Zone.Identifier, ASCII 6->24 dropped 26 SecuriteInfo.com.T...7.9683.3142.exe.log, ASCII 6->26 dropped 38 Found many strings related to Crypto-Wallets (likely being stolen) 6->38 40 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 6->40 14 InstallUtil.exe 2 6->14         started        42 Antivirus detection for dropped file 10->42 44 Multi AV Scanner detection for dropped file 10->44 46 Machine Learning detection for dropped file 10->46 18 InstallUtil.exe 1 10->18         started        20 InstallUtil.exe 12->20         started        signatures5 process6 dnsIp7 28 185.125.50.121, 56001, 62155, 62159 INPLATLABS-ASRU Russian Federation 14->28 48 Found many strings related to Crypto-Wallets (likely being stolen) 14->48 signatures8

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe63%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                      SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe76%VirustotalBrowse
                      SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe100%AviraTR/AD.GenSteal.oztov
                      SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\cvchost.exe100%AviraTR/AD.GenSteal.oztov
                      C:\Users\user\AppData\Local\cvchost.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\cvchost.exe63%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                      C:\Users\user\AppData\Local\cvchost.exe76%VirustotalBrowse
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://stackoverflow.com/q/14436606/233540%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      https://stackoverflow.com/q/11564914/23354;0%URL Reputationsafe
                      https://stackoverflow.com/q/2152978/233540%URL Reputationsafe
                      https://github.com/mgravell/protobuf-neti0%Avira URL Cloudsafe
                      https://github.com/mgravell/protobuf-net0%Avira URL Cloudsafe
                      https://github.com/mgravell/protobuf-netJ0%Avira URL Cloudsafe
                      https://stackoverflow.com/q/2152978/23354rCannot0%Avira URL Cloudsafe
                      https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exe0%Avira URL Cloudsafe
                      https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exe0%Avira URL Cloudsafe
                      https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dll0%Avira URL Cloudsafe
                      https://github.com/mgravell/protobuf-neti0%VirustotalBrowse
                      https://stackoverflow.com/q/2152978/23354rCannot0%VirustotalBrowse
                      https://github.com/mgravell/protobuf-net0%VirustotalBrowse
                      https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dll0%VirustotalBrowse
                      https://github.com/mgravell/protobuf-netJ0%VirustotalBrowse
                      https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exe0%VirustotalBrowse
                      https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exe0%VirustotalBrowse
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://github.com/mgravell/protobuf-netSecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/mgravell/protobuf-netiSecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://stackoverflow.com/q/14436606/23354cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000008.00000002.3469069611.00000000030D7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://github.com/mgravell/protobuf-netJSecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3337708568.00000000054AC000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000037D3000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://stackoverflow.com/q/2152978/23354rCannotInstallUtil.exe, 00000004.00000002.3477514753.00000000031F2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://stackoverflow.com/q/11564914/23354;SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000004.00000002.3477514753.00000000031F2000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000008.00000002.3469069611.00000000030D7000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://stackoverflow.com/q/2152978/23354SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.00000000063C7000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2706811222.00000000076B0000.00000004.08000000.00040000.00000000.sdmp, SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008159000.00000004.00000800.00020000.00000000.sdmp, cvchost.exe, 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://github.com/testdemo345/DemoThing/raw/main/chromedriver.exeInstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/testdemo345/DemoThing/raw/main/msedgedriver.exeInstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/testdemo345/DemoThing/raw/main/WebDriver.dllInstallUtil.exe, 00000007.00000002.3391846318.00000000025C0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      185.125.50.121
                      unknownRussian Federation
                      207064INPLATLABS-ASRUfalse
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1464091
                      Start date and time:2024-06-28 12:33:07 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 9m 6s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:9
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@9/5@0/1
                      EGA Information:
                      • Successful, ratio: 66.7%
                      HCA Information:
                      • Successful, ratio: 84%
                      • Number of executed functions: 627
                      • Number of non-executed functions: 16
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded IPs from analysis (whitelisted): 40.126.32.72, 40.126.32.138, 40.126.32.76, 40.126.32.68, 40.126.32.74, 20.190.160.22, 40.126.32.140, 20.190.160.14
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, ctldl.windowsupdate.com, 6.d.a.8.b.e.f.b.0.0.0.0.0.0.0.0.4.0.0.a.0.0.1.f.1.1.1.0.1.0.a.2.ip6.arpa, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
                      • Execution Graph export aborted for target SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe, PID 4068 because it is empty
                      • Execution Graph export aborted for target cvchost.exe, PID 6816 because it is empty
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      TimeTypeDescription
                      06:34:50API Interceptor13x Sleep call for process: SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe modified
                      06:35:46API Interceptor26x Sleep call for process: cvchost.exe modified
                      12:35:04AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run cvchost C:\Users\user\AppData\Local\cvchost.exe
                      12:35:12AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run cvchost C:\Users\user\AppData\Local\cvchost.exe
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      185.125.50.121ka0UKl7202.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        INPLATLABS-ASRUka0UKl7202.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                        • 185.125.50.121
                        https://steamcommunlty.duckdns.org/br-redeemSteamGiftCard=481928385858/IP:Get hashmaliciousUnknownBrowse
                        • 185.125.50.1
                        El7TD9RYMH.exeGet hashmaliciousRedLineBrowse
                        • 185.125.50.19
                        xqj4nAXq60.exeGet hashmaliciousRedLineBrowse
                        • 185.125.50.19
                        networkmanagerGet hashmaliciousUnknownBrowse
                        • 185.125.49.121
                        No context
                        No context
                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                        File Type:CSV text
                        Category:dropped
                        Size (bytes):443
                        Entropy (8bit):5.351576856885998
                        Encrypted:false
                        SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTADzzAbDLIP12MUAvvrTL2MDpdGlD/SJx:Q3La/KDLI4MWuPTAWzAbDLI4MNldKZav
                        MD5:134F0668B8F37D560B4D8C617407BA79
                        SHA1:819571730A25D180A1F85F9991E7D00EE1927E1B
                        SHA-256:3705F978CF66225BC42AFA9C69006C3B81CB92DD77C08400E9C68FC35F140D57
                        SHA-512:F523F2F7CFB2EAF7E06D44C3E4824E5F89E61B08B7C15EB90BBB0D86F48ABDE43CF7578D64EE1BFC1F3EF66DD50B9A33E02BC5940A81E6E982EF5A29C7421274
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Management\96012833bebd5f21714fc508603cda97\System.Management.ni.dll",0..
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):805
                        Entropy (8bit):5.355825766733025
                        Encrypted:false
                        SSDEEP:24:ML9E4KlKDE4KhKiKhIE4Kx1qE4qpAE4KzeR:MxHKlYHKh3oIHKx1qHmAHKzeR
                        MD5:7516119B9A2EB57F057E287C2D411DA0
                        SHA1:4FF258F99431C6A96203C20E761999236B9D503C
                        SHA-256:E14E24828927191906BC1603C48B8E30AD0952D20FD34EFA00ED8D5D810EA469
                        SHA-512:DB7424D27FBFFB1F4D35C56B73A8D83286BF49980227496B6951267C2F0F1EB4C48A663871561427A4705F6C883A67DFAB7E4C3D040D13C2F93D57BD149A761E
                        Malicious:true
                        Reputation:moderate, very likely benign file
                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..
                        Process:C:\Users\user\AppData\Local\cvchost.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):805
                        Entropy (8bit):5.355825766733025
                        Encrypted:false
                        SSDEEP:24:ML9E4KlKDE4KhKiKhIE4Kx1qE4qpAE4KzeR:MxHKlYHKh3oIHKx1qHmAHKzeR
                        MD5:7516119B9A2EB57F057E287C2D411DA0
                        SHA1:4FF258F99431C6A96203C20E761999236B9D503C
                        SHA-256:E14E24828927191906BC1603C48B8E30AD0952D20FD34EFA00ED8D5D810EA469
                        SHA-512:DB7424D27FBFFB1F4D35C56B73A8D83286BF49980227496B6951267C2F0F1EB4C48A663871561427A4705F6C883A67DFAB7E4C3D040D13C2F93D57BD149A761E
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Category:dropped
                        Size (bytes):2801152
                        Entropy (8bit):7.982671451403981
                        Encrypted:false
                        SSDEEP:49152:HnfT3GGQtfuwFLich65S72+o49kBIXZGaLGqce1HMggnTkLRR1oEiwqP6PbOO:H72GQV9iI6dakBzFCsggTkdR1oDwyqOO
                        MD5:80AB4901E0E9519B8D3A6B774A822F8B
                        SHA1:65933DF4128E1BB5AAC049C535C784FB16E4B34E
                        SHA-256:407FA06249007223B302B481A49E1ABAF8A10FE3409E6812C6F2FC9FF9E29582
                        SHA-512:85B62195C62E6871020EE26D43DDC93E693149E11E0C4C9CB7F03DF7CC5686742C1606FECD19F60A58268EADE429F4C70E8716097C9DF081F204A50ADA68433E
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 63%
                        • Antivirus: Virustotal, Detection: 76%, Browse
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...<..f..................*.........^.*.. ........@.. ....................... +...........`...................................*.K.....*.......................+...................................................... ............... ..H............text...d.*.. ....*................. ..`.rsrc.........*.......*.............@..@.reloc........+.......*.............@..B................@.*.....H.........)...................(..........................................0..........(....*.*.0..........s......o......8.....o......X....2..o....(....*..(....*J.(.....s....}....*....0.......... 9;..(....#.......?s..... .;..(....#.......?s..... .>..(....#333333.?s.......o......o.....{.....o.....{.....o.....{.....o......(....}....*...0..@........{....o.....8......(.....{....o......(....-..............o.....*........%1.......0..J.......#..........{....o.....8......(.......o....X.
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):26
                        Entropy (8bit):3.95006375643621
                        Encrypted:false
                        SSDEEP:3:ggPYV:rPYV
                        MD5:187F488E27DB4AF347237FE461A079AD
                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                        Malicious:true
                        Reputation:high, very likely benign file
                        Preview:[ZoneTransfer]....ZoneId=0
                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):7.982671451403981
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        • Win32 Executable (generic) a (10002005/4) 49.78%
                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        File name:SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                        File size:2'801'152 bytes
                        MD5:80ab4901e0e9519b8d3a6b774a822f8b
                        SHA1:65933df4128e1bb5aac049c535c784fb16e4b34e
                        SHA256:407fa06249007223b302b481a49e1abaf8a10fe3409e6812c6f2fc9ff9e29582
                        SHA512:85b62195c62e6871020ee26d43ddc93e693149e11e0c4c9cb7f03df7cc5686742c1606fecd19f60a58268eade429f4c70e8716097c9df081f204a50ada68433e
                        SSDEEP:49152:HnfT3GGQtfuwFLich65S72+o49kBIXZGaLGqce1HMggnTkLRR1oEiwqP6PbOO:H72GQV9iI6dakBzFCsggTkdR1oDwyqOO
                        TLSH:C0D53324276C472AD1BEA1FEB09201499BB4D3BAA70BE796F910F5F11C073518BE7127
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...<..f..................*.........^.*.. ........@.. ....................... +...........`................................
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x6ad35e
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x660ED83C [Thu Apr 4 16:41:32 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x2ad3100x4b.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x2ae0000x600.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x2b00000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x2ab3640x2ab400a03daa7b37f2d6626d11a9a90c58ff45unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rsrc0x2ae0000x6000x6009ec115f4437e9c09ad34a32fdb098f36False0.421875data4.154065704326117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x2b00000xc0x20010f89d1e9120f414f7c036bb66e98543False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_VERSION0x2ae0900x35cdata0.40232558139534885
                        RT_MANIFEST0x2ae3fc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                        DLLImport
                        mscoree.dll_CorExeMain
                        TimestampSource PortDest PortSource IPDest IP
                        Jun 28, 2024 12:35:04.325419903 CEST6215556001192.168.2.5185.125.50.121
                        Jun 28, 2024 12:35:04.330390930 CEST5600162155185.125.50.121192.168.2.5
                        Jun 28, 2024 12:35:04.330513000 CEST6215556001192.168.2.5185.125.50.121
                        Jun 28, 2024 12:35:04.331516981 CEST6215556001192.168.2.5185.125.50.121
                        Jun 28, 2024 12:35:04.336574078 CEST5600162155185.125.50.121192.168.2.5
                        Jun 28, 2024 12:35:04.347609997 CEST6215556001192.168.2.5185.125.50.121
                        Jun 28, 2024 12:35:04.352893114 CEST5600162155185.125.50.121192.168.2.5
                        Jun 28, 2024 12:36:04.842041016 CEST5600162155185.125.50.121192.168.2.5
                        Jun 28, 2024 12:36:04.842134953 CEST6215556001192.168.2.5185.125.50.121
                        Jun 28, 2024 12:36:06.367866039 CEST6215556001192.168.2.5185.125.50.121
                        Jun 28, 2024 12:36:06.368406057 CEST6215956001192.168.2.5185.125.50.121
                        Jun 28, 2024 12:36:06.372822046 CEST5600162155185.125.50.121192.168.2.5
                        Jun 28, 2024 12:36:06.373267889 CEST5600162159185.125.50.121192.168.2.5
                        Jun 28, 2024 12:36:06.373342037 CEST6215956001192.168.2.5185.125.50.121
                        Jun 28, 2024 12:36:06.373421907 CEST6215956001192.168.2.5185.125.50.121
                        Jun 28, 2024 12:36:06.378197908 CEST5600162159185.125.50.121192.168.2.5
                        Jun 28, 2024 12:36:06.378252029 CEST6215956001192.168.2.5185.125.50.121
                        Jun 28, 2024 12:36:06.384634972 CEST5600162159185.125.50.121192.168.2.5
                        TimestampSource PortDest PortSource IPDest IP
                        Jun 28, 2024 12:34:59.655540943 CEST5365075162.159.36.2192.168.2.5
                        Jun 28, 2024 12:35:00.123841047 CEST53595881.1.1.1192.168.2.5

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:06:34:15
                        Start date:28/06/2024
                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Inject5.3917.9683.3142.exe"
                        Imagebase:0xf90000
                        File size:2'801'152 bytes
                        MD5 hash:80AB4901E0E9519B8D3A6B774A822F8B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2705835929.00000000075E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2701165050.00000000070C0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2676535036.0000000004B55000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2676535036.0000000004651000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2686932880.0000000006286000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2686932880.0000000005F91000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2673795300.0000000003651000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2686932880.0000000006851000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2673795300.00000000038C7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.2676535036.0000000004DEE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:true

                        Target ID:4
                        Start time:06:35:01
                        Start date:28/06/2024
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        Imagebase:0xcc0000
                        File size:42'064 bytes
                        MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:false

                        Target ID:5
                        Start time:06:35:12
                        Start date:28/06/2024
                        Path:C:\Users\user\AppData\Local\cvchost.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\cvchost.exe"
                        Imagebase:0xdc0000
                        File size:2'801'152 bytes
                        MD5 hash:80AB4901E0E9519B8D3A6B774A822F8B
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000002.3296837065.00000000084D5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000002.3267363349.0000000006321000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000005.00000002.3296837065.0000000008041000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000002.3267363349.0000000005E21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000005.00000002.3235297290.0000000003686000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000005.00000002.3296837065.0000000007E61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000002.3242527529.0000000004565000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000002.3267363349.0000000006821000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000005.00000002.3242527529.00000000047F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000002.3242527529.00000000047F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000005.00000002.3242527529.0000000004B65000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 63%, ReversingLabs
                        • Detection: 76%, Virustotal, Browse
                        Reputation:low
                        Has exited:true

                        Target ID:6
                        Start time:06:35:20
                        Start date:28/06/2024
                        Path:C:\Users\user\AppData\Local\cvchost.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\cvchost.exe"
                        Imagebase:0x20000
                        File size:2'801'152 bytes
                        MD5 hash:80AB4901E0E9519B8D3A6B774A822F8B
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000006.00000002.3337708568.0000000005326000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000006.00000002.3337708568.00000000050F6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000006.00000002.3337708568.0000000005B7C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000006.00000002.3336111454.0000000004054000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000006.00000002.3337708568.00000000051E6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000006.00000002.3337708568.0000000005146000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000006.00000002.3322490075.0000000002631000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000006.00000002.3322490075.00000000027A2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:true

                        Target ID:7
                        Start time:06:35:56
                        Start date:28/06/2024
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        Imagebase:0xe0000
                        File size:42'064 bytes
                        MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.3384646842.0000000000502000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000007.00000002.3395117407.00000000049F0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                        Reputation:moderate
                        Has exited:true

                        Target ID:8
                        Start time:06:36:04
                        Start date:28/06/2024
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                        Imagebase:0xdb0000
                        File size:42'064 bytes
                        MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:true

                        Reset < >
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: Djq
                          • API String ID: 0-3204991199
                          • Opcode ID: 186955b20563b00264c4cb33eb79d6d5f05a11511addd2a6a3a2a6d4427db122
                          • Instruction ID: 4debd84866860aa1f94379c1ef3f0d61815c8cb279daa8c10819109dbe94c417
                          • Opcode Fuzzy Hash: 186955b20563b00264c4cb33eb79d6d5f05a11511addd2a6a3a2a6d4427db122
                          • Instruction Fuzzy Hash: B5D1E0B4A01219CFDB14DFA9D990A9DBBF2FF89300F1081A9D409AB365DB31AD81CF50
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8a8be148a3017498f77fb7a9f59c2df596ecb71d0a844eb730607f93e51689c8
                          • Instruction ID: f8980a5161e5c3949451669a5197ee75f731fdf99a6eac7d7f9bb2cce5d1ec02
                          • Opcode Fuzzy Hash: 8a8be148a3017498f77fb7a9f59c2df596ecb71d0a844eb730607f93e51689c8
                          • Instruction Fuzzy Hash: 20928974A04209CFD721CF58C988BA9BBFAFB44308F55D0AAD4059B2A6D379EC85CF51
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f367ae9ca7d0c2ee13f67c712a4b4f193332e017f3e160ca3e936e599d2d66a2
                          • Instruction ID: 10e70b5fb2d75d53357cbcfe0f1c4fd3bc3a474202957d579c00990ac2b60235
                          • Opcode Fuzzy Hash: f367ae9ca7d0c2ee13f67c712a4b4f193332e017f3e160ca3e936e599d2d66a2
                          • Instruction Fuzzy Hash: 73516BB4A01218CFDB54DF29D894BA9B7F6FB49310F1084A9D90AAB361DB389D80CF01
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: f7b1361f86476234122b6e963b937e13740aa354a9c623c9328edc545fa761ac
                          • Instruction ID: 81277e34cfe05cf42522268f2be4f9aa5dcef768fdd5e8311beced98bad6eea8
                          • Opcode Fuzzy Hash: f7b1361f86476234122b6e963b937e13740aa354a9c623c9328edc545fa761ac
                          • Instruction Fuzzy Hash: D4D2067A650510EFDB4A8F98D948D55BBB2FF4D32471A81D8F2099B232C732E861EF50
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$TJhq$TJhq$Tecq
                          • API String ID: 0-2523468475
                          • Opcode ID: 2d7f20bb0ef268963f54052128e4ae60c3ec0c61a03e2bbf54ee2e51fc0a623e
                          • Instruction ID: 3dd0b5e96ee716961d6c61abe9ee8365781148269ae7ee0a52ba2d482b0d11e8
                          • Opcode Fuzzy Hash: 2d7f20bb0ef268963f54052128e4ae60c3ec0c61a03e2bbf54ee2e51fc0a623e
                          • Instruction Fuzzy Hash: 6BE15B78A04204CFD754CFA8D598B6DBBF6FF89710F19416AE5069B3A6CA30DC45CB81
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: d%iq$d%iq$$cq$$cq
                          • API String ID: 0-476168907
                          • Opcode ID: a1ac92f4466cfa0722bf9f557a09b9e347aaca47da2dad9ed919062814c4c276
                          • Instruction ID: 19c96e46ac0abf5069796657e1358326235e8a5eaa11796d5b03601d39c27c73
                          • Opcode Fuzzy Hash: a1ac92f4466cfa0722bf9f557a09b9e347aaca47da2dad9ed919062814c4c276
                          • Instruction Fuzzy Hash: 50611074B042048FCB15CB388C51B2A7BBAFF85310F2941AAD50ACB3E6DA34DC438792
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 65d753e6704133309cb5917e615f9d9eef6587696e4b993b14d32b446552b547
                          • Instruction ID: 13f2b464341d39eab7e7dfe1ff6091f3d292a4158a844cb37a79d5479d06bd98
                          • Opcode Fuzzy Hash: 65d753e6704133309cb5917e615f9d9eef6587696e4b993b14d32b446552b547
                          • Instruction Fuzzy Hash: 98C04C7650E680CFDF134E2988E01797E397F5210031DD9D5D44B4F55BC2389587DB66
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: Tecq$Tecq
                          • API String ID: 0-2088518435
                          • Opcode ID: 4b4b6b64a2abbbbd3536728cfdecdb635c442580d1466784d5f21da76c086beb
                          • Instruction ID: 4cc28d5d6652922859e51372bb32ba9f4ae604a3468ab728a3626815f539fb61
                          • Opcode Fuzzy Hash: 4b4b6b64a2abbbbd3536728cfdecdb635c442580d1466784d5f21da76c086beb
                          • Instruction Fuzzy Hash: 36318F70F002099FCB59EFB9C5546AEBBF7AF88210F614469E406BB3A5DE749D01CB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: Tecq$Tecq
                          • API String ID: 0-2088518435
                          • Opcode ID: 6aaeeee377cc1a1873a4edc7dd75ec3f3d4998d945d8e6997494866fa3758fa5
                          • Instruction ID: 5c4129246fcbe771fefcd1a38b1a345522e3424c1253bc0f427851f60929577b
                          • Opcode Fuzzy Hash: 6aaeeee377cc1a1873a4edc7dd75ec3f3d4998d945d8e6997494866fa3758fa5
                          • Instruction Fuzzy Hash: 3D316F70F002059FCB49EFB9C5546AEBAEBAF88210F604469E406BB3A5CE749D01CB91
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: &$A
                          • API String ID: 0-867333088
                          • Opcode ID: c2e8b843ddfa33d81bb6020475a127be504c5e321e0c2f0f2a9fd181dee0a766
                          • Instruction ID: 1799d7bd132e55fb69eb77bfe15198ca33612506b76aa5e9c81442be672f5592
                          • Opcode Fuzzy Hash: c2e8b843ddfa33d81bb6020475a127be504c5e321e0c2f0f2a9fd181dee0a766
                          • Instruction Fuzzy Hash: 7401E4B194226ACFDF248F94E908BEEBBB2BB45305F0050D5D608AA290D7B85EC4DF00
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: '$A
                          • API String ID: 0-846207447
                          • Opcode ID: 25694aa4ad4487f6451e97f04297e176caa62faa16d1c7b4f2efb9131f0decee
                          • Instruction ID: 6568df26594eefddf5296a25af01a4a237f71a8fba7ed9cafe5086905f53c4ba
                          • Opcode Fuzzy Hash: 25694aa4ad4487f6451e97f04297e176caa62faa16d1c7b4f2efb9131f0decee
                          • Instruction Fuzzy Hash: 34F0DAB5919358CFDB64CF64C9547D9BBB0AB49314F1050D9850DAB380D7785E86CF00
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: Tecq
                          • API String ID: 0-1122318316
                          • Opcode ID: 6e925a2a6d62b692a4983bb750fd418ea8329bdb310c9047899e4491de355462
                          • Instruction ID: 523e4e0928de0c2cca127240006b76b1257fbd5b26791b0335b8a3ee39924235
                          • Opcode Fuzzy Hash: 6e925a2a6d62b692a4983bb750fd418ea8329bdb310c9047899e4491de355462
                          • Instruction Fuzzy Hash: BC312378B00215CFDB14DFA9D998BADBBB5BF88314F184469E902EB3A1CB709801CB40
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq
                          • API String ID: 0-182294849
                          • Opcode ID: 1176e6bd5c79d39a6b6073fadc0434cee7b1814480b1bd20d8194f5ad7803b5e
                          • Instruction ID: 6ee811d4418847a5b101d6d8df03a91c15d8f1410f105bd525465a8322a58cc4
                          • Opcode Fuzzy Hash: 1176e6bd5c79d39a6b6073fadc0434cee7b1814480b1bd20d8194f5ad7803b5e
                          • Instruction Fuzzy Hash: 3B115BB1E0220ACBCB04DFA9C8415EEBBFDBF89300F10986AC505AB250EB349940CB95
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: "
                          • API String ID: 0-123907689
                          • Opcode ID: 7e0d139622f7feb31b7df4f6ab884ecf77ea9b6524dbd5436ce33979ceb8370c
                          • Instruction ID: adf4f6d2cafc201d1cf17414718f5b4de54fe462cbde3aec55c31783575d00a1
                          • Opcode Fuzzy Hash: 7e0d139622f7feb31b7df4f6ab884ecf77ea9b6524dbd5436ce33979ceb8370c
                          • Instruction Fuzzy Hash: 5601B675942229CFDB20CF54D988BEABBB1FB05304F1480E5E608A7651D7789E85DF00
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: /
                          • API String ID: 0-2043925204
                          • Opcode ID: e4d1115227153fcdaf54ac8bc88bd0793236718b9bd342b428aa0a4b3f74ece5
                          • Instruction ID: 8a06a52358e982f3a629f699cce95dba1f8cda8a1f390008179002f83a5698b6
                          • Opcode Fuzzy Hash: e4d1115227153fcdaf54ac8bc88bd0793236718b9bd342b428aa0a4b3f74ece5
                          • Instruction Fuzzy Hash: 1801A4B094212ACFEB25DF55D854BEABBB1FB49300F4051E9C909A7350DB35AE80CF00
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: /
                          • API String ID: 0-2043925204
                          • Opcode ID: e7532cda2e72891e09bb7f45c36b50492ca629b77ed497f5fda2587459e4109a
                          • Instruction ID: 3cb700a9ffbe817b20928e240bbe1d30de84b3499c3efd87256b11f3035bf1eb
                          • Opcode Fuzzy Hash: e7532cda2e72891e09bb7f45c36b50492ca629b77ed497f5fda2587459e4109a
                          • Instruction Fuzzy Hash: 4C0174B094311ACFEB34CF95E958BEABBB1BB05304F4051E6C918A7650D3749E84CF44
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: 7
                          • API String ID: 0-1790921346
                          • Opcode ID: 1a754945e7b499fadcea32f74b7ae35e5e08410bae4f879c40f057aa59d0c315
                          • Instruction ID: 39f9af103ee777d7f4f9ec04dd7122b02f76cf49e9d165c4bdd50f572246686c
                          • Opcode Fuzzy Hash: 1a754945e7b499fadcea32f74b7ae35e5e08410bae4f879c40f057aa59d0c315
                          • Instruction Fuzzy Hash: 92F0A4B194221D9BCF25DF94D954BDEBBB1BF45304F101099D109A6290CB742E84DF05
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: A
                          • API String ID: 0-3554254475
                          • Opcode ID: 606b09da9a26630c140d523e26a212bef8ded596d155359432e3ffb248402291
                          • Instruction ID: 07a4aff18e3f097725b48cbab191dc62491c33769beefc73ddf6ff403698335d
                          • Opcode Fuzzy Hash: 606b09da9a26630c140d523e26a212bef8ded596d155359432e3ffb248402291
                          • Instruction Fuzzy Hash: A9F0D47294126ADFCF24AFA0DD18BDDBB72BB85301F0054DA95096A290CB781EC4DF40
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: 8
                          • API String ID: 0-4194326291
                          • Opcode ID: b23d19fabe9d949dcc105da7542a9aacc6d9328935483525c93da1bd07078bad
                          • Instruction ID: 941eb9b61427380c1a25947479bbe9e190629c8f136b30ad550bcc70f7f62d79
                          • Opcode Fuzzy Hash: b23d19fabe9d949dcc105da7542a9aacc6d9328935483525c93da1bd07078bad
                          • Instruction Fuzzy Hash: ECF0F4B0982229CFDB64CF50D988BDEBBB1BB05304F4041E9D508A7690D7399EC4CF00
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: A
                          • API String ID: 0-3554254475
                          • Opcode ID: def1df251cb4b14fcaadb4f2b406148bfcee398f6739caefa2dc1d41a37a2763
                          • Instruction ID: a612f76324c3be6e014d0cfcea014eeb386fb6abd30f1799a2c6ed493df3273e
                          • Opcode Fuzzy Hash: def1df251cb4b14fcaadb4f2b406148bfcee398f6739caefa2dc1d41a37a2763
                          • Instruction Fuzzy Hash: 3CF0A5B6946229DFDF349F90D908BEEBFB1AB44305F0050D5950966290C7B81AC8EF01
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: !
                          • API String ID: 0-2657877971
                          • Opcode ID: 4453d8de03b418a9ca18c4519fc6594d205bfb6e81b0e83956f6ae09ff6d7f41
                          • Instruction ID: 61dd53fdd82037616f3ec0120fe4d87d564f6d4cfccd3290d7bb6b41693907cf
                          • Opcode Fuzzy Hash: 4453d8de03b418a9ca18c4519fc6594d205bfb6e81b0e83956f6ae09ff6d7f41
                          • Instruction Fuzzy Hash: 10F06CB4A4622ACBCBB0CF94E888B9ABAB1BB09314F1090D9C508A7641D7749E84CF05
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f7bd230155b5db5eb6daf3a2608823cbaa07eb54985f0a28f3a136a7dc39c98c
                          • Instruction ID: 268ca79cdcffed5cf2dc49d8c0afbcd9c221b5d6b21d9391fbd14eb85a3f8ceb
                          • Opcode Fuzzy Hash: f7bd230155b5db5eb6daf3a2608823cbaa07eb54985f0a28f3a136a7dc39c98c
                          • Instruction Fuzzy Hash: 185201B4905208CFD321CF08D588E59BBFAFB40748F56E19AD4159B266E37AEC88CF50
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: aa8cc0d6b45a1a4f1fa29e76d18eca233d894344309e5821b3757898cc322c5a
                          • Instruction ID: 73732f79a5c9a1b8b1d173462007b59631aea4d59e7e408c4a1c19a955f8855f
                          • Opcode Fuzzy Hash: aa8cc0d6b45a1a4f1fa29e76d18eca233d894344309e5821b3757898cc322c5a
                          • Instruction Fuzzy Hash: 0A8116B5A012198FDB15DF68C48499EBBF9FF88314B1585A9E806DB371DB30ED81CB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 57d64ffdabb21e0fe25b3bc8297f2840b8e471ebdf37f5806067e9ffd17c9b57
                          • Instruction ID: f38cd65f81c85e275fe46da9be3cd770f6de72d20ff64ac7fe34f11726b191ca
                          • Opcode Fuzzy Hash: 57d64ffdabb21e0fe25b3bc8297f2840b8e471ebdf37f5806067e9ffd17c9b57
                          • Instruction Fuzzy Hash: A781F4B4E06218CFCB14EFA9D495AEEBBB5FB8A304F20912AC505AB345C7349D45CF91
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a16f867755a93225536a0e69e937662ef6e9aaf3e6651ff0f1e16e149b8529ae
                          • Instruction ID: 849f7e982b20707d748bfbb63342796eae0df7dbe0acd2fd2bd8dca92d3aea6c
                          • Opcode Fuzzy Hash: a16f867755a93225536a0e69e937662ef6e9aaf3e6651ff0f1e16e149b8529ae
                          • Instruction Fuzzy Hash: 2B515BB4D06219CFDB24CF65C814BEABBB5FF4A304F0091EAD648A7240D7745A98DF51
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9bf8208983652dc4eac908fb19a719b67326390b7fda1c3ab04701bfb852e2f1
                          • Instruction ID: 66d7a0c8fed8a90fbeab03389712a991973fe9739d474a04fe2b7b5ddf63cc80
                          • Opcode Fuzzy Hash: 9bf8208983652dc4eac908fb19a719b67326390b7fda1c3ab04701bfb852e2f1
                          • Instruction Fuzzy Hash: AD511774A00605DFCB24CFA9C544AAABBF9FF98310F14892BE91ADB755D330E941CB91
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 54e8e769d84ff44987cbcc096a769e48388d3857a5af4c79ecf63146b66c1459
                          • Instruction ID: 13abcf873276042ed980118810a8e405cf69840c2296877c6cd33e2884ca1113
                          • Opcode Fuzzy Hash: 54e8e769d84ff44987cbcc096a769e48388d3857a5af4c79ecf63146b66c1459
                          • Instruction Fuzzy Hash: EC511974A00205DFCB24CF59C584AAABBF9FF98310F14C92BE51A9B754D330E941CB91
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 30ec22a1546567186d383caff1857ff13101ccbd9d00fa17cc83a441a76ed56f
                          • Instruction ID: 911e0be4fda40bf520668e498604cc3ea5878fc4f2fe89f75aebb77fb3fe254f
                          • Opcode Fuzzy Hash: 30ec22a1546567186d383caff1857ff13101ccbd9d00fa17cc83a441a76ed56f
                          • Instruction Fuzzy Hash: 67418E35F102098FDB59DB69C4146AE7FBBFBC5200F188569C506CB294EF389D428B82
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c852832fa8335a1e9cefae884db5e45282cbfdf7e069f11895b4d094e9500543
                          • Instruction ID: ba60a9f4ca39ebbdaf7f6c75118a74bb7d126d839ccddcc2dbb3e15a9853de0d
                          • Opcode Fuzzy Hash: c852832fa8335a1e9cefae884db5e45282cbfdf7e069f11895b4d094e9500543
                          • Instruction Fuzzy Hash: 5741C0B6E0420ACFDB01DF94C8807AEBBB5FF84340F19886BD545AB252D7349945CB61
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 86f31be6568e20afc5ca0162a6eef16125a1cd05808068f93a4df0e5283a9cf1
                          • Instruction ID: 4f147610de0ca1aeb252b3a4aeef9f9fb8321d878de4fd11d8c0178f907d9989
                          • Opcode Fuzzy Hash: 86f31be6568e20afc5ca0162a6eef16125a1cd05808068f93a4df0e5283a9cf1
                          • Instruction Fuzzy Hash: 58319070E0520A9FCB09CFA9C554A9EFBF6FF85340F24456AE805AB341DB70AC45CB81
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4cb8ba5e1e5b5050994c0d5605df34866e8fd88eebc4d0d2bd7e8efc30717260
                          • Instruction ID: 3e11850de11f8c7978497f14ca0d64167222540105a56afce2337147b67af42a
                          • Opcode Fuzzy Hash: 4cb8ba5e1e5b5050994c0d5605df34866e8fd88eebc4d0d2bd7e8efc30717260
                          • Instruction Fuzzy Hash: 775118B4D05229DFDBA1CF29CD84BD9BBF5BB49300F0081EA990DA7210E7319A849F40
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e954beb3721deb3a1d758c3a4c52cec1fd1c896859ecd26c26b3e1865d2c7433
                          • Instruction ID: 094dd9d6aa457a309653d001e5464549fe1bb39126cdb340ac02548ae907cada
                          • Opcode Fuzzy Hash: e954beb3721deb3a1d758c3a4c52cec1fd1c896859ecd26c26b3e1865d2c7433
                          • Instruction Fuzzy Hash: 7641B3B4906229CFEB24CF65D854BDABBB5FF49305F0052EAD509A7240D3749A88DF11
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 10bb6d2a531045ae5b812beff3f56da9878a6dbdaa99a41890fa2147f0331fbb
                          • Instruction ID: d5d897a79f2d1e3d3fac22e5ad9c4312f83ef8c1b1ebe740669cac37f0a98cfb
                          • Opcode Fuzzy Hash: 10bb6d2a531045ae5b812beff3f56da9878a6dbdaa99a41890fa2147f0331fbb
                          • Instruction Fuzzy Hash: 94317E70E1524A9FDB09CFA5C550A9EBBF6BF85340F25416AE801EB391DB70ED46CB80
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 20d8f807095af1f10e8e67d25f4106e7c7cdaeffc701d9a409443ec0c459ba4f
                          • Instruction ID: a702c3864cb41683e686dcd68ab84b3fd5435078629eded64d7f9054203cdf4f
                          • Opcode Fuzzy Hash: 20d8f807095af1f10e8e67d25f4106e7c7cdaeffc701d9a409443ec0c459ba4f
                          • Instruction Fuzzy Hash: B721C7713087459FF7618A7DD94477E7FECEBE02A4F08493AD442C6681F6A4D885C391
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 249c38469071f705a804cf779032d8f44b22776f7a0915e1706cf6946d0e2188
                          • Instruction ID: 0afc43078dcdc028d04c213484de39377fcab737d205d522ed1b9ac0fdb0e248
                          • Opcode Fuzzy Hash: 249c38469071f705a804cf779032d8f44b22776f7a0915e1706cf6946d0e2188
                          • Instruction Fuzzy Hash: 4F219F35F042058FDB19DB64D5546BA3FBEFBC5351F1884A9C906C7294EB388C028F82
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4a4247ac9cd0530164d5d9149024b75779e435f93efb8546791a193619e671b9
                          • Instruction ID: 81736ef50c47957ce016f8ad0716f99592645266560b08c0c9a0d37d8262f3da
                          • Opcode Fuzzy Hash: 4a4247ac9cd0530164d5d9149024b75779e435f93efb8546791a193619e671b9
                          • Instruction Fuzzy Hash: ED4138B5D05629CFDBA1CF29CC84BDABBF5BB49301F1091EA950DA7210E7319AC49F40
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 33affbf7fd6c9471fae49e40892eac7a5de7c78a34dbd6d57542c0fb40a86d24
                          • Instruction ID: 03cf0b1f5b20accc5de1c14abdfc2f3e902c3b94ac95f10c7f29d90019cc072c
                          • Opcode Fuzzy Hash: 33affbf7fd6c9471fae49e40892eac7a5de7c78a34dbd6d57542c0fb40a86d24
                          • Instruction Fuzzy Hash: 4F312B75E0120A9FCB08CFA5D590A9EFBF2BF89340F658165E905AB351D770ED428B90
                          Memory Dump Source
                          • Source File: 00000000.00000002.2671791193.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_174d000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a4d4f8b07efbf80469e894bca203e033bd06007365518ab821d9678e9de80dc5
                          • Instruction ID: dd1214dd22a5684b512dffbce2413e5ce85ea3121d32fbe888660b0056e288cf
                          • Opcode Fuzzy Hash: a4d4f8b07efbf80469e894bca203e033bd06007365518ab821d9678e9de80dc5
                          • Instruction Fuzzy Hash: 35212571104244DFCB25DF98D9C4B26FF65FB98364F24C5A9E9490B256C336D406C6B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 353484f315c3deb0189b437809de4414353981aa916b0a48d510defe0d3d1367
                          • Instruction ID: 17002a3638257514c6b9089bb2fa3c58f3f84dae4671040c331e905fdcbabd33
                          • Opcode Fuzzy Hash: 353484f315c3deb0189b437809de4414353981aa916b0a48d510defe0d3d1367
                          • Instruction Fuzzy Hash: CC216274E00205CFCB44DFB8C9849AEBBB6FF89301B518469E901EB355DB74AD45CB91
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 44bdec35ad2be479d31e92e131b564e061ee9450e1dbd142894fe08191270da6
                          • Instruction ID: b15d9a8172d8b8adad057fe7a6c27b3eda275eb3d0355e8ac82880c9854e114a
                          • Opcode Fuzzy Hash: 44bdec35ad2be479d31e92e131b564e061ee9450e1dbd142894fe08191270da6
                          • Instruction Fuzzy Hash: 47216D38B006158FC319AB78E55817EFBB7FBC8211B50856DE44A87399DF315926CB81
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 961a9e732aa29d0d4008fd632e3d3c3f5d455d1fbf1f95630cfc1284e382e5de
                          • Instruction ID: 97adb85b222e3ce6053069367f13eca143942e274b6f39287b968fd41b7abac6
                          • Opcode Fuzzy Hash: 961a9e732aa29d0d4008fd632e3d3c3f5d455d1fbf1f95630cfc1284e382e5de
                          • Instruction Fuzzy Hash: 8711C170E1070ADFCB08CFA5D95459EBB76FF85300F20812AE801AB744DBB0A986CB80
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b1c497f8b3f3d45b1b7193c19e7dd4d2891130a61c354d9e770630f8d7ea2b3c
                          • Instruction ID: f1e227b52b98bb17c53fe8339013c8ca48ee4a5ed774c7e3ea0a3f3b836c372b
                          • Opcode Fuzzy Hash: b1c497f8b3f3d45b1b7193c19e7dd4d2891130a61c354d9e770630f8d7ea2b3c
                          • Instruction Fuzzy Hash: 8F119074E0020A9FCB00DFB8D9849AEBBB6FF88301F508469E801AB355DB30AD45CF90
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 16f3b7829cfe816409900532d2f48efa5e70a1041a38333322726c141341847d
                          • Instruction ID: 6cd79109207a6dd023d8d9b8e017fa303fa89bbb7adce080c37ec4c3f0dc3c0a
                          • Opcode Fuzzy Hash: 16f3b7829cfe816409900532d2f48efa5e70a1041a38333322726c141341847d
                          • Instruction Fuzzy Hash: 44119EB8E0A208EFC760CFA8D4415E8BFB4EF49310F1081EAC81897341DB315E42DB91
                          Memory Dump Source
                          • Source File: 00000000.00000002.2671791193.000000000174D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0174D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_174d000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 42ffd1060d4716d88ab02c1f84f02b90d98ab478aa7c1853a2e815d1f450a477
                          • Instruction ID: c81476886a46a918a67b66e8db71a14d372d606d57fd1c7a36d80f7e5f44fcb5
                          • Opcode Fuzzy Hash: 42ffd1060d4716d88ab02c1f84f02b90d98ab478aa7c1853a2e815d1f450a477
                          • Instruction Fuzzy Hash: BB11D376504280CFDB16CF54D5C4B16FF71FB84314F24C5A9D9490B656C33AD41ACBA2
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 855fe6652974a5b5fbf5a8530ffd84527e4b9472d91ecf194f307efc29d39c8b
                          • Instruction ID: ce976c5784b228d41cc22a93ab92953781ab98954b01348c10cce21779242d40
                          • Opcode Fuzzy Hash: 855fe6652974a5b5fbf5a8530ffd84527e4b9472d91ecf194f307efc29d39c8b
                          • Instruction Fuzzy Hash: B401F730318B414BD729A729D65063B7799EBC1700F59887EE14A8B599DE34AC81C345
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 730b7db299a5b55beeec39487895095ac2744d1f1f4372407636539adf0f3d02
                          • Instruction ID: 7c12fdbe337d419480f5103a509109dce39fa4c2e7467d4730c8394fa5c5f3e4
                          • Opcode Fuzzy Hash: 730b7db299a5b55beeec39487895095ac2744d1f1f4372407636539adf0f3d02
                          • Instruction Fuzzy Hash: 87115B38A00114CFEB14CFB8D598BADBB75EF88320F184065E503AB391DB70DD458B81
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 08c246ec4f90e12a5a3a463ae1eefd9a52eab81c86f58e503241d5b44ca09940
                          • Instruction ID: 3f8bba4ab18a0d9ab3d81b49229633a9003633a0db91a65acf44bc42a40af7c8
                          • Opcode Fuzzy Hash: 08c246ec4f90e12a5a3a463ae1eefd9a52eab81c86f58e503241d5b44ca09940
                          • Instruction Fuzzy Hash: A501F1367082119FC3218A698844B2ABEFAFFCD310F08846AE50ADB395DA748C018792
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9fcad7896ef9dd7389abd3724c7adce6f25dccbe773a16c8dc2b33ce10aa36ed
                          • Instruction ID: bb720ac60798a8e998c3cb85b041effffb5cac3acf6b381a0f608b388035e671
                          • Opcode Fuzzy Hash: 9fcad7896ef9dd7389abd3724c7adce6f25dccbe773a16c8dc2b33ce10aa36ed
                          • Instruction Fuzzy Hash: A401D6767081159FC3245A599844B2ABBEFFFCC360F188426E51ADB394DA719C018791
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 59b3db1a57af4ae2cee30b65928dff3b0dab19ef24ea608b91611cde6a6d41cb
                          • Instruction ID: 1bfb8963ed14acabeb37b452e30130219cd620fc820684e9d872f7265d122e64
                          • Opcode Fuzzy Hash: 59b3db1a57af4ae2cee30b65928dff3b0dab19ef24ea608b91611cde6a6d41cb
                          • Instruction Fuzzy Hash: 7B1179B890A208EFC754DFA8D481AEDBFB4EF49310F10C1EAD854A7341DB319A45DB92
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a9546fb52f7bcde1f133408af0949810ab71bb389292728d96c26e4944b007b0
                          • Instruction ID: f2ac8463d90663a5e6f33d0c0291f00a2f1a6a2171ede2cf80bc3183b43b8644
                          • Opcode Fuzzy Hash: a9546fb52f7bcde1f133408af0949810ab71bb389292728d96c26e4944b007b0
                          • Instruction Fuzzy Hash: 1411CE70300201CFD746DB28D558B2A3BAAEF95744F149168E80ACF3A2EB34EC85CB40
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4ed94dc6e187935b734ce2facf3f6a6d640f8de967d6bc5b532fc210a80724d4
                          • Instruction ID: e34a875eb19ac7b4fc4366d0a88c9760637dd9a8f4b8d704e38ca8284298f73e
                          • Opcode Fuzzy Hash: 4ed94dc6e187935b734ce2facf3f6a6d640f8de967d6bc5b532fc210a80724d4
                          • Instruction Fuzzy Hash: 7511F3B4E0020A9FDB44DFA9C8456BFFBF1FF88300F20846A9518A7344DB349A418F91
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4ddf6f1c033d3ffb73b3643ffefc2ea123bb47d61cc77a50bee3dd74ebd4bb0c
                          • Instruction ID: 25206d05b37a837bf1191edfae3fb9e3560714cf3404e218f9a340dcc6b94dee
                          • Opcode Fuzzy Hash: 4ddf6f1c033d3ffb73b3643ffefc2ea123bb47d61cc77a50bee3dd74ebd4bb0c
                          • Instruction Fuzzy Hash: 38011674B402069FD7158BA9C894A6EBBB9BF88304F180069E402DB3A1DBB49801CB40
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2b31c1efe638294eb5ce66d2fac17fb2504a038bdf0b7e1d8dafa110475a32b8
                          • Instruction ID: ec67783410dcfae6e7b835f45c9a863793bd8043cf7a7912f3c43d9063686f02
                          • Opcode Fuzzy Hash: 2b31c1efe638294eb5ce66d2fac17fb2504a038bdf0b7e1d8dafa110475a32b8
                          • Instruction Fuzzy Hash: 480192B45062258FC714DF68D899AAAB7B0FB49304F0040D9D95A57209CB344F42CF40
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ae0fa73b578732c7b5a833643acba080267f01cf2d07b9a91bae967e399dd5d0
                          • Instruction ID: cad11da37e18c79583e2b746611f00a9129022bcf2756c2f9e144e30bcd85982
                          • Opcode Fuzzy Hash: ae0fa73b578732c7b5a833643acba080267f01cf2d07b9a91bae967e399dd5d0
                          • Instruction Fuzzy Hash: 61018F7180434A9FCF01DF94D8008EEBF74FF4A320F00C51AE69467211D731A595DBA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a30ffe1d1e6652d765f6d75b737b0e0ca78af7949664b591b07ba26265e2787a
                          • Instruction ID: 22be540f9d99b0397853059ff7b0ee1588fbe51af3815dcab27c7c95fcfb828b
                          • Opcode Fuzzy Hash: a30ffe1d1e6652d765f6d75b737b0e0ca78af7949664b591b07ba26265e2787a
                          • Instruction Fuzzy Hash: EBF0B4B494A2089BC724CBA8E4815E9FF74EF47314F1051DAC85857341EF314D55C791
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 90706eefc2cffbb309039517f43166f2b8d6e3c5b062179002f1cbea05caa5b8
                          • Instruction ID: 6dbbff876a25b00353bb9a63cf48838e855100c62d47714cdb35995512b18d9a
                          • Opcode Fuzzy Hash: 90706eefc2cffbb309039517f43166f2b8d6e3c5b062179002f1cbea05caa5b8
                          • Instruction Fuzzy Hash: D61108B4902218CFEB31CF45D884BEEBBB2FB49308F109498D448AB690C3B4A9C0DF41
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d3c777e0b36cad366d423c09d13ce933a07eda8bccfc3b1da60c03539ef291c7
                          • Instruction ID: 6a700832d339fb5e94149121ce05961719b2a30792745b1f95bd14d91a649d31
                          • Opcode Fuzzy Hash: d3c777e0b36cad366d423c09d13ce933a07eda8bccfc3b1da60c03539ef291c7
                          • Instruction Fuzzy Hash: CDF0E2313004005BC32A773CB5582BCFFA6EFC5663741402AE04ACB14ACF340C4A8795
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2ceeece00c6c70e3a89b9c98247e81f7fbda2e708d780bb1e981d7a9418e736d
                          • Instruction ID: 52497b80fcf9d9f7a1dea4c6c7e87d51827f49ef1098d3b69fd3d7c4b557070b
                          • Opcode Fuzzy Hash: 2ceeece00c6c70e3a89b9c98247e81f7fbda2e708d780bb1e981d7a9418e736d
                          • Instruction Fuzzy Hash: 63F0FA38809208EFCB12CFA4D8409ECBFB1EF49300F10C0DAE8905B251C7328E62EB91
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: df1e0a73f51847a46bfe27c749ac47b3901653405c7bf9c69ce62eb22532d393
                          • Instruction ID: 0c2a6730b9cf6e8d6e15d514f9fd693bd3215f5a0f9e4867b657febe08489393
                          • Opcode Fuzzy Hash: df1e0a73f51847a46bfe27c749ac47b3901653405c7bf9c69ce62eb22532d393
                          • Instruction Fuzzy Hash: 41F0377180020AEBCF10DF98D8008EEBB79FF89320F00C619EA5873210D731A5A2DB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cf22a030d4733f99ad97937b2ff47dd39078f8b59ecc90d3e653a9b51b0edbea
                          • Instruction ID: 421a9cb0205c93bf6cf62c3bee13f029adec53ebf1d1a459e7ff767d52bdbb2a
                          • Opcode Fuzzy Hash: cf22a030d4733f99ad97937b2ff47dd39078f8b59ecc90d3e653a9b51b0edbea
                          • Instruction Fuzzy Hash: 4AE06D363004109B822AB77DB95C06DFA9BEFC5A63781442AE14ACF249DF341D4A87A6
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 648cfba5666490716cfbdbd27814b755d72feb7e67edfd68cc630426a2784294
                          • Instruction ID: fd050e8812e59c36ab28485be32e8541ba5be349c766f8f4e6aedb5439f81d44
                          • Opcode Fuzzy Hash: 648cfba5666490716cfbdbd27814b755d72feb7e67edfd68cc630426a2784294
                          • Instruction Fuzzy Hash: FFF0B478809248FFCB02DFA4D4409EDBFB4AF4A310F14C1AAE89456252C7369A51DF82
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ad6de1d7bdbc54ac4b71760e2cfaea370398a0bbadfb64ba9bb86b2dacd10b86
                          • Instruction ID: f8ce86d0cd970916bf33613cef7f21f36271e3782b3d0514216c7f7e7de44045
                          • Opcode Fuzzy Hash: ad6de1d7bdbc54ac4b71760e2cfaea370398a0bbadfb64ba9bb86b2dacd10b86
                          • Instruction Fuzzy Hash: 48F027B9509108EFCB01CFA4E9408ED7F75EF06310F14819AFC04272A1C732AA52EB92
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d9351c7eb735fde7bf61a76987e6d59b23a3cf7397b114925e5e407964d62d40
                          • Instruction ID: aeb27a35267454c10948b9a6f6cafd246c9bb35cb31b9bb1987ab576094596c1
                          • Opcode Fuzzy Hash: d9351c7eb735fde7bf61a76987e6d59b23a3cf7397b114925e5e407964d62d40
                          • Instruction Fuzzy Hash: 55F082B480A208EFC711CFA4E4816E8BFB0EF49314F10C1EAD85497341D7364E55DB91
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e2332efe45cd470a4ef78fc55b0910aabbf7fbe19cdce78e435ece92dd06c590
                          • Instruction ID: aca52a123218cb8dcded7c991ca99bd0b9323f410ca2c4920ca1598dcf845a06
                          • Opcode Fuzzy Hash: e2332efe45cd470a4ef78fc55b0910aabbf7fbe19cdce78e435ece92dd06c590
                          • Instruction Fuzzy Hash: 0201287190121ECBCF25DF94D844BEAB771FF49304F008695EA58A7610DB74AAD1CF40
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: efcda2d202c085a9cbde539cc03f1afa11a6f6abf00756d044fc1058b3f2a4c6
                          • Instruction ID: c2279d3272b1fe5258896faece093a201d82464dcdf6369e21776c313735f740
                          • Opcode Fuzzy Hash: efcda2d202c085a9cbde539cc03f1afa11a6f6abf00756d044fc1058b3f2a4c6
                          • Instruction Fuzzy Hash: 8F01D2B0946229CFDB30CF40D858BEABBB1BB0A315F0050E5C609A6250D7785AC4CF01
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3f7aff9fe924715e39f722194a271aaa846bd11bcd0096450c723abaddde2d87
                          • Instruction ID: b5e856ec92b849258bbad09247ff0029723f2f034af7296c0607a7c25415cf8c
                          • Opcode Fuzzy Hash: 3f7aff9fe924715e39f722194a271aaa846bd11bcd0096450c723abaddde2d87
                          • Instruction Fuzzy Hash: 3D011970941219DFDB60CF44DC40BEABBB1EB04305F1480E9D608A7290DB75AEC5DF00
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d7680615e8c5fb2bef5ca916c817f1165f51a40220a21190cab829c310d09ffe
                          • Instruction ID: 6b8dc7d8d3573a5b708301a05cc5c07139bb4bc193a6acd603e916f4424fe339
                          • Opcode Fuzzy Hash: d7680615e8c5fb2bef5ca916c817f1165f51a40220a21190cab829c310d09ffe
                          • Instruction Fuzzy Hash: D2F012B4E05208EFCB94DFA8D840AADBFF8AB49311F14C49AA858D3341D6359B51DF51
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bb63b6587439c18d32e8469c65971fe6180349046b5887ab712d07050fe79316
                          • Instruction ID: b796915bbc5aa0957fdde4bdf9f8266b0c76eb2b335592c7bb7532c28ea75cdc
                          • Opcode Fuzzy Hash: bb63b6587439c18d32e8469c65971fe6180349046b5887ab712d07050fe79316
                          • Instruction Fuzzy Hash: 2FF03478A09109EFCB04DF98D4459DDBFB1EF48310F10C0AAE85852210DB328A65EF41
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fa3bc51c5cdc163286f6e2d178b836ef0c2dacf8ae40fece1303e85e61ec3fe8
                          • Instruction ID: b8d0472d143de428b462338745c9c97af86ba807259968dd183d0bc8746cd9f0
                          • Opcode Fuzzy Hash: fa3bc51c5cdc163286f6e2d178b836ef0c2dacf8ae40fece1303e85e61ec3fe8
                          • Instruction Fuzzy Hash: 53F0B474601154DFC714EF98D86899AB775FB49304F0044DAD449AB349CB744F82CF50
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8afe058c98e24fb1851c3c95b6a6cf9a7cc81ef061241d04d0582683e5c634ae
                          • Instruction ID: 098a7288b5d4c967425a7dff9184b1b08720c5e06867a616d37084cd66d6411f
                          • Opcode Fuzzy Hash: 8afe058c98e24fb1851c3c95b6a6cf9a7cc81ef061241d04d0582683e5c634ae
                          • Instruction Fuzzy Hash: 6AF027B0A15158DBC714EF84D1583FEB776FB96344F101554900E5B395CB391D89CF50
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fdc44cd7b0f59d439c822da4ccc3549521c79472248b3bf0693302f79aa92fc4
                          • Instruction ID: baa0ecb862301d60afdd9480047cc0a5769d8bcb33837ce22e0395ab16245d42
                          • Opcode Fuzzy Hash: fdc44cd7b0f59d439c822da4ccc3549521c79472248b3bf0693302f79aa92fc4
                          • Instruction Fuzzy Hash: D3F0157890520CEFCB44DF98D8419EEBBB5EB48310F10C0A9ED6863350CB329A65EF41
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0250bce7901ae0019351b40a5eee87d87afc78d5f20c627d7ff076b1d4783a78
                          • Instruction ID: 523a415411046da36da3e2f4b1094a0581cad2cbaacb902c8593893567158099
                          • Opcode Fuzzy Hash: 0250bce7901ae0019351b40a5eee87d87afc78d5f20c627d7ff076b1d4783a78
                          • Instruction Fuzzy Hash: E6F0D4B4905219DFDB21DF84E894BEABBB6FB49304F108494E549AB650C374AED0DF81
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 78e310346484faea4509041067c918e160dd1ffaed5a102cf795bb0457a471f9
                          • Instruction ID: 02a7b721770da06dbe4491dce0989f7b94ebcd622fcd7462e50b1baebfaa209e
                          • Opcode Fuzzy Hash: 78e310346484faea4509041067c918e160dd1ffaed5a102cf795bb0457a471f9
                          • Instruction Fuzzy Hash: A2F0157890520CEFCB55CF94D841AEDBFB5EB48310F10C1AAED5462251C7329A61EF41
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1f0c49d9df75c07d9b68496e2cd512d194252a0bc7b2ddc074ed809d3cdbe5d8
                          • Instruction ID: 26e46e0f50a93b9a2e3523c8de94b7b1d1ab05cbbd22ca2abf1e04f8ec9a3d37
                          • Opcode Fuzzy Hash: 1f0c49d9df75c07d9b68496e2cd512d194252a0bc7b2ddc074ed809d3cdbe5d8
                          • Instruction Fuzzy Hash: F8E03070204B069BC766EB28E14048DF7A6FFC4710750CE69E08A47555DB70AD998B95
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f660d357498a94506d33312f4f03b6ab7f1b640931662605e7d42c5e777298b5
                          • Instruction ID: 473ce39e853f4daef7f18be278dea815b5373b8f1ea8bf8e4b20b6bf6d06ed68
                          • Opcode Fuzzy Hash: f660d357498a94506d33312f4f03b6ab7f1b640931662605e7d42c5e777298b5
                          • Instruction Fuzzy Hash: 57E06D7850510CEBCF44CF94E8409ADBB79EB49310F10C459ED0423261C7329A61EB42
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 44a431fa571e77c81514fb90516c79839e1ae4dc173c9302b79f5b7281fa0253
                          • Instruction ID: 633398815bba5f6b64040c6d14b83d3370b348deae702383dd6604637dd0549b
                          • Opcode Fuzzy Hash: 44a431fa571e77c81514fb90516c79839e1ae4dc173c9302b79f5b7281fa0253
                          • Instruction Fuzzy Hash: 5BE0EDB4E05208EFCB84DFA9D440ADCFBF4EB48314F10C5AA9919A3340D7359A51DF81
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 44a431fa571e77c81514fb90516c79839e1ae4dc173c9302b79f5b7281fa0253
                          • Instruction ID: c44183bce82601f6a3091e6be949d6921168078c40afd636339f549d18a068c9
                          • Opcode Fuzzy Hash: 44a431fa571e77c81514fb90516c79839e1ae4dc173c9302b79f5b7281fa0253
                          • Instruction Fuzzy Hash: 12E0C9B4E05208EFCB94DFA8D440A9CBBF4EB48314F20C5AAD818A3351D7359A51DF51
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 44a431fa571e77c81514fb90516c79839e1ae4dc173c9302b79f5b7281fa0253
                          • Instruction ID: aaeb88045abfbffb8de524ce7fe602e38e854ce878d5bd14553cbcc2f01ee8f1
                          • Opcode Fuzzy Hash: 44a431fa571e77c81514fb90516c79839e1ae4dc173c9302b79f5b7281fa0253
                          • Instruction Fuzzy Hash: 26E0C9B4E05208EFCB84DFA8D840A9DBBF4EB48310F10D5AA9818A3350D7759A51DF41
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 44a431fa571e77c81514fb90516c79839e1ae4dc173c9302b79f5b7281fa0253
                          • Instruction ID: cd90471556773f053afd6c62c001c5111019576548188ada9f632c38634d00f7
                          • Opcode Fuzzy Hash: 44a431fa571e77c81514fb90516c79839e1ae4dc173c9302b79f5b7281fa0253
                          • Instruction Fuzzy Hash: 53E0C9B4E05208EFCB84DFA8D440A9DBBF8EB49310F10C5AAA918A7350D7359A51DF85
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c16b6e94fef11ce52793be6b99ff376e2a1569c740ed96d6cc28f514cc0aed8c
                          • Instruction ID: 69b78c619d77d0031d28bc0654fed5146a7d13fb3dde74309bc4808aa21763b0
                          • Opcode Fuzzy Hash: c16b6e94fef11ce52793be6b99ff376e2a1569c740ed96d6cc28f514cc0aed8c
                          • Instruction Fuzzy Hash: 07E08CA008B6CA9FCB529B68C884AD9BF78AF03215F1420DAD95463292DF710E64D762
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e58f9e149bc11c228836fa38f1084fad238cccbcd8a226be0a9c29871a658754
                          • Instruction ID: db82f545f8e52143d88dea0c02854da394a7260ffe8bfe7e9a0c3fa4fc8e78a5
                          • Opcode Fuzzy Hash: e58f9e149bc11c228836fa38f1084fad238cccbcd8a226be0a9c29871a658754
                          • Instruction Fuzzy Hash: D9F01578905208EFCB55CF94C8449ADBFB9AF49310F10C0AAA91462250CB329A51EF81
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 48cccc0538c9340c903e94ccbd3a66edf7a16084d13c4518f1f7782e44fce7a2
                          • Instruction ID: f17018f570d01b0a4c37c38a6a0ab398bd4ade95a434d6b5f1324c5f51a362d6
                          • Opcode Fuzzy Hash: 48cccc0538c9340c903e94ccbd3a66edf7a16084d13c4518f1f7782e44fce7a2
                          • Instruction Fuzzy Hash: 47E065B890510CEFCB04CF94E940DEEBF75EB49310F10C499ED0423290C732AA61EB81
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4a48c562eca3fa49affe8e1db80f2feda63403a2a222ae498414b7644abde938
                          • Instruction ID: 4c32423e988b94242f73904980e7140549982e67d0df57e2e9ffc4ead0ba09a7
                          • Opcode Fuzzy Hash: 4a48c562eca3fa49affe8e1db80f2feda63403a2a222ae498414b7644abde938
                          • Instruction Fuzzy Hash: F2F0F4B0942229CFCB20CF50D858BEABBB1FB06314F4040E5D608A3260D3789EC4CF00
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dc4f5c15a5746c1487549b191f678e2df69a09c3432e8dc11c4ef16d32b63d51
                          • Instruction ID: fc03e37cd3c3754c3c14e35bb0d8bb57db24ba29c8ec26e77361011135ed97b6
                          • Opcode Fuzzy Hash: dc4f5c15a5746c1487549b191f678e2df69a09c3432e8dc11c4ef16d32b63d51
                          • Instruction Fuzzy Hash: 4BE086B8909108EFC744DF94E4409ADBFB8AB45311F10D5AED95857341C7329A81DB95
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2826f6f1a28208c9e8288271fc3c70ac80e46c0449dd78e67669ac3fba50d4e5
                          • Instruction ID: 159c922cc3efee4b5315d573e59ef9db576cae0cae08430ac0c8f9ab12fb20a0
                          • Opcode Fuzzy Hash: 2826f6f1a28208c9e8288271fc3c70ac80e46c0449dd78e67669ac3fba50d4e5
                          • Instruction Fuzzy Hash: CDE0E5B8905208EFCB54DF98D4419ADBFB4EB49310F20C1AAD86463341CA369A56EB85
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2826f6f1a28208c9e8288271fc3c70ac80e46c0449dd78e67669ac3fba50d4e5
                          • Instruction ID: cd82cd420f61e33bd9ebb1c684d8ffcaaa0e55c9dec751f2be0f52551b4c32f4
                          • Opcode Fuzzy Hash: 2826f6f1a28208c9e8288271fc3c70ac80e46c0449dd78e67669ac3fba50d4e5
                          • Instruction Fuzzy Hash: 57E0E5B8906208ABCB55DF98D481AADBFB4EB49310F10C1AA985463341C6359A91EF95
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 842135657bc0d9c7e1667a3b947d92744dc8142bfd4228abf28bb3bedf599ca3
                          • Instruction ID: b039af51a15fd8e4bd1abdbf85f2fe41b26f5e941e33bb92adcf3f821fdd2560
                          • Opcode Fuzzy Hash: 842135657bc0d9c7e1667a3b947d92744dc8142bfd4228abf28bb3bedf599ca3
                          • Instruction Fuzzy Hash: 64E04FB4D05108EFC744DFA8D4406ACFBB8EF49314F10C1EAD85857341D6365A41DF41
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6ed44e62bcc21576bf5c8c5c9e04a2075cf6974f0f239182ceb3526581374d96
                          • Instruction ID: d3706de6989ce61e2d1bbd8129802df77ac5c197ccdbc256973a9d756702d632
                          • Opcode Fuzzy Hash: 6ed44e62bcc21576bf5c8c5c9e04a2075cf6974f0f239182ceb3526581374d96
                          • Instruction Fuzzy Hash: 49E01AB4E06108EBCB54DF98D4819ADBBB4EB48315F10C1A9981863340CB319A41DB41
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9e536a74a2715901e588f03b41b0c551a4a548c9d5360f16078725366d532a0b
                          • Instruction ID: 61ef8af8cbf7e19c5a547f4d1c74174584e7edee67fb0a67045e953fbabce603
                          • Opcode Fuzzy Hash: 9e536a74a2715901e588f03b41b0c551a4a548c9d5360f16078725366d532a0b
                          • Instruction Fuzzy Hash: 5EF0A575A022199FCF25EF90DE65BDDBBB2FF44300F1010999209BB290CA342E80CF05
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 06ed7c09a804e8fd267d546092c4ef3849dd3138e42f78f951070aaea89d915b
                          • Instruction ID: 6f33ce103cf14f01a28355f6d5923b28f7af0a3fbfbf00d7d815c9ee296c1408
                          • Opcode Fuzzy Hash: 06ed7c09a804e8fd267d546092c4ef3849dd3138e42f78f951070aaea89d915b
                          • Instruction Fuzzy Hash: 4FE01274C0530C9FCB90EFB8A50556BBFF8BA08250F1485AA991CE6224F7704A50CFD5
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 02f91d2642a8b9ce2362f2a24d0d71ae21b92367a442610aaf6b0c256581e366
                          • Instruction ID: 88357d8cba336bb49a456610a33d9277a5e942003073cca48add5f69f36fe437
                          • Opcode Fuzzy Hash: 02f91d2642a8b9ce2362f2a24d0d71ae21b92367a442610aaf6b0c256581e366
                          • Instruction Fuzzy Hash: 56E0C2B4D1620CDFCB84DFB8D4456ACBBFCAB04311F1050A9CC08A3341E7301A90CB42
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: edfe01230964d913d4f84c856fcd8f47cba67b6f1ce73fbfd81f7cee898e3c8a
                          • Instruction ID: b642db605952416d8690c518c7668b4b98db46146df27f16f1fb63d903a7e87b
                          • Opcode Fuzzy Hash: edfe01230964d913d4f84c856fcd8f47cba67b6f1ce73fbfd81f7cee898e3c8a
                          • Instruction Fuzzy Hash: DAE0C2B890A108DBC704DF94D4409EDBBB8EB45314F20E1AAC91827351D7319E42DB91
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 97494cafeab3428e7a8d133cfe6fc43d1052af3dd21d748dd9b9f7825adeda8f
                          • Instruction ID: 1e519182c16e04380ced2111fb85fa2c75cc65a366292149b854089abc8cf722
                          • Opcode Fuzzy Hash: 97494cafeab3428e7a8d133cfe6fc43d1052af3dd21d748dd9b9f7825adeda8f
                          • Instruction Fuzzy Hash: 52E06DB0A101589BC754EB90E5683EEB666FB99344F000898800A6B355CA391D85CF50
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 28210f0eb8e9b54a8b8e6db351e0871e5847a6d23592873cd2dff5c95ebba732
                          • Instruction ID: 1ca72f4a0c47f58f165eaf9fec58b0c8afb7a70890f6e9867483a8416a2cd535
                          • Opcode Fuzzy Hash: 28210f0eb8e9b54a8b8e6db351e0871e5847a6d23592873cd2dff5c95ebba732
                          • Instruction Fuzzy Hash: CCE0C2F890A208DBC754DFE8D5419EEBFB4EB46314F20D1A9C80823341C7315E42DB81
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dc5a9047e3895959ca2f8b281e600c495f4860d30f7fd82bb4fb048d040cb768
                          • Instruction ID: 8020bd4792135220f3d7c1ad253de26118c621db1b1f0ab13a5afde87bd9969f
                          • Opcode Fuzzy Hash: dc5a9047e3895959ca2f8b281e600c495f4860d30f7fd82bb4fb048d040cb768
                          • Instruction Fuzzy Hash: 05E08634904588ABCB21CFD0C4509ECBF71EB45314F14C1CAEC6517281CB379752EB51
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 28210f0eb8e9b54a8b8e6db351e0871e5847a6d23592873cd2dff5c95ebba732
                          • Instruction ID: d4cd70a2f3273c0a048d25c224242df060403a7161b0a03ec24c3957001500bf
                          • Opcode Fuzzy Hash: 28210f0eb8e9b54a8b8e6db351e0871e5847a6d23592873cd2dff5c95ebba732
                          • Instruction Fuzzy Hash: 2CE08CB890A20CDBC714DBD4D5419ADFBB4EB46314F2091A9880823340C6315E42DB91
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: baaaa235a077725b402e5f1a8f5b60db11b2a1e83082b68fc0228bcd489225bd
                          • Instruction ID: 36c015e04f40aac68ed195ff0dee7b2b0898137baeb93db008dbf734ced803e0
                          • Opcode Fuzzy Hash: baaaa235a077725b402e5f1a8f5b60db11b2a1e83082b68fc0228bcd489225bd
                          • Instruction Fuzzy Hash: DDD0A9F048B14C9BCB64EAA88440EEA7A6CAF03220F0060A8891833281CE300A50D646
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c4df366a67068daee74a63dcb354ecffcc0c36845eea14bdc51ee402f584f3be
                          • Instruction ID: 64560aa93062dfc4a7c5290dd8888a5b1ef5c665f2fa818872614012534704c8
                          • Opcode Fuzzy Hash: c4df366a67068daee74a63dcb354ecffcc0c36845eea14bdc51ee402f584f3be
                          • Instruction Fuzzy Hash: 37E0B6B5A1221CABCB21DF90DE54BDEBB75EB04300F101095A609A6290D3341A508F00
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d631c274c6a938cb378a01c827814ddc3b3fe36aa458f6a2647cd7095ddf76ff
                          • Instruction ID: 64560aa93062dfc4a7c5290dd8888a5b1ef5c665f2fa818872614012534704c8
                          • Opcode Fuzzy Hash: d631c274c6a938cb378a01c827814ddc3b3fe36aa458f6a2647cd7095ddf76ff
                          • Instruction Fuzzy Hash: 37E0B6B5A1221CABCB21DF90DE54BDEBB75EB04300F101095A609A6290D3341A508F00
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 91a7e9527e1499fb962d7ec041ed4c0e4ea406e717692ca282b352fed66a67bb
                          • Instruction ID: 31b1832222388857256c4b6dddc3d6584dbed22e7d6b99762e96e06ea29208f8
                          • Opcode Fuzzy Hash: 91a7e9527e1499fb962d7ec041ed4c0e4ea406e717692ca282b352fed66a67bb
                          • Instruction Fuzzy Hash: EBD0C9B4D0520C9F8B80EFF8940526EBBF8BA08200F1045AAD809E3204FB704A108FD2
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ea2e22cf2b7ecc1c4d52cbd3e1b7b5a1865f67c9923bdad26b785927af0d4d33
                          • Instruction ID: 9ee74fd110807694301761aa8faea6639c84fb370598ad8ddc00896d869c2ce9
                          • Opcode Fuzzy Hash: ea2e22cf2b7ecc1c4d52cbd3e1b7b5a1865f67c9923bdad26b785927af0d4d33
                          • Instruction Fuzzy Hash: E1C02BF40CBE0983C2686688614C7F0339C4707316F10BC11670E00033C7744490D6F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b8e5684ab4f7fbe9938edc856b641fec88a741986307e394620a4aa7086c4442
                          • Instruction ID: 5981baebbc344e27ffb3485f87e76abd68de2b5f6724552b5d459ff2c5286e37
                          • Opcode Fuzzy Hash: b8e5684ab4f7fbe9938edc856b641fec88a741986307e394620a4aa7086c4442
                          • Instruction Fuzzy Hash: A2D0C7B9D0B35ECBCB21CF6099507D67FF09B16314F1011D6C91C96291E7700A45CF01
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8e728cde9ce24260dba1e5cac42058d01080abd4b3ac25f331d8dc7ec445646e
                          • Instruction ID: 8a7345d72385048a7a4164acd5cb9540634935017d5a765d134b7fafab652c5f
                          • Opcode Fuzzy Hash: 8e728cde9ce24260dba1e5cac42058d01080abd4b3ac25f331d8dc7ec445646e
                          • Instruction Fuzzy Hash: 6EA02238008A0E8BBEA23F883E0E2303B0CE800023380082BFB0EC0C02CF80A08002C8
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2f2229a319f5cbba8fc25514d10380a05d3861a2664522761129f78ae00324e2
                          • Instruction ID: aa032c0522467c7ff8ab260b9fbd7d2e2b380985f68e37a807432a61ed70edc6
                          • Opcode Fuzzy Hash: 2f2229a319f5cbba8fc25514d10380a05d3861a2664522761129f78ae00324e2
                          • Instruction Fuzzy Hash: 48B0127894D00CCB8625599434040347638DA5015270C4282A84A880085E510C20CA93
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4ea4742d593be279dd784f62da1a9d1c761dd6820dca1dda13ed14e393d25daa
                          • Instruction ID: 08788148dcd6b4cbcc1dcac777e62414ba5d8869d5bb37f1db76b797e466aaa5
                          • Opcode Fuzzy Hash: 4ea4742d593be279dd784f62da1a9d1c761dd6820dca1dda13ed14e393d25daa
                          • Instruction Fuzzy Hash: 9390223000820C8B820023803C0A200330C80000203800002A00E008000B0020000288
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1a89202d09950440c5d590c5745ce02bfb8f208c456e1ef2e5f5bf60740c5fa1
                          • Instruction ID: 43d46cec13cccd18aa937c3c38b2d76590ff9901b893beaddff87a5564d8ee3d
                          • Opcode Fuzzy Hash: 1a89202d09950440c5d590c5745ce02bfb8f208c456e1ef2e5f5bf60740c5fa1
                          • Instruction Fuzzy Hash: F5B125B0E02218CFDB24DFA5D495BEEBBB5FB4A304F10906AD409AB351DB349985CF11
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708622024.0000000007EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07EB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7eb0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ff4d4567c3feea4c10cb0ec4484cc990b6a9049e0f9f0319519fccdcddd24aac
                          • Instruction ID: 9188e8f0519cc11a707db68846510c45477f112ae807ef1a3382881e1b1e26c9
                          • Opcode Fuzzy Hash: ff4d4567c3feea4c10cb0ec4484cc990b6a9049e0f9f0319519fccdcddd24aac
                          • Instruction Fuzzy Hash: B0B106B0E02218CFDB24DFA5D495BEEBBB1FB4A304F10906AD409AB351DB749985CF11
                          Memory Dump Source
                          • Source File: 00000000.00000002.2708799674.0000000007ED0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07ED0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ed0000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 77bf088ef1db2638f2dfb0784c727468c77bc6505a00f978483eac946f99097b
                          • Instruction ID: 6cf7f29d84d4912599348fe1db0af9cdb7c03bf6ac86ba0e1b1ae9588b33b40a
                          • Opcode Fuzzy Hash: 77bf088ef1db2638f2dfb0784c727468c77bc6505a00f978483eac946f99097b
                          • Instruction Fuzzy Hash: 56813BF0D16218CFEB28DFA9C9447DDBBB9BF4A304F24A869D009A7260DB745985CF11
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 7cff1d2c0b7806d8d3b9d45d22a77dcd4c4c63740376e769d6b227b3b0c8b5f6
                          • Instruction ID: 6db616226b3bba3279efb4210f63d05676366c53a8ec32e3f9be994b12903336
                          • Opcode Fuzzy Hash: 7cff1d2c0b7806d8d3b9d45d22a77dcd4c4c63740376e769d6b227b3b0c8b5f6
                          • Instruction Fuzzy Hash: 43C08C6200E2848ECF070A2944E02316D2C3F52000B0CD8DAC44B8B007C228C4879B21
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 7af16169453bb5081240e45141b6143af6f255d05b6f40562978f86b73fcf2d3
                          • Instruction ID: d626af6fcc33af453469bd79ef8772d2aae640ba20112653cb39d2ff1d7c7a5b
                          • Opcode Fuzzy Hash: 7af16169453bb5081240e45141b6143af6f255d05b6f40562978f86b73fcf2d3
                          • Instruction Fuzzy Hash: 0AC08C7280E280EE8F030E2846A00346D283F1342030DC8DAC44A4A08BC128C48B8F79
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 4cd317eb249ea2675cbfda6876cdf9e4f7a42f777a45047556d4e9aa1d1a6012
                          • Instruction ID: 34e612bb55f5ed55ec1f5c90144295df43ace123cad07eaabda164bc9e1ba30b
                          • Opcode Fuzzy Hash: 4cd317eb249ea2675cbfda6876cdf9e4f7a42f777a45047556d4e9aa1d1a6012
                          • Instruction Fuzzy Hash: A9B01130208000CACA028A00C8A02203230BF82208B3888AAC00B8B20AC320C88BCA02
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.2672225636.0000000001A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 01A60000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1a60000_SecuriteInfo.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 823ed2d2df556360fd5e084fec3c2391a191aba04b4eb5bfb00d3a94b3d459a9
                          • Instruction ID: 684dc030fb23bfdba21e6abad810ff9dfcf46fe7d1064f06cda97ee3250a5b8b
                          • Opcode Fuzzy Hash: 823ed2d2df556360fd5e084fec3c2391a191aba04b4eb5bfb00d3a94b3d459a9
                          • Instruction Fuzzy Hash: DAB012B1807380CFC7048E008185740BFD0BF40209F17C0DDC1000F053923DC10BC600

                          Execution Graph

                          Execution Coverage:9.1%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:11
                          Total number of Limit Nodes:0
                          execution_graph 32311 14e5208 32312 14e5211 32311->32312 32314 14e6b87 32311->32314 32317 14ed330 32314->32317 32319 14ed343 32317->32319 32321 14ed3e0 32319->32321 32322 14ed428 VirtualProtect 32321->32322 32324 14e6b9d 32322->32324 32325 14ed5b0 32326 14ed5f0 FindCloseChangeNotification 32325->32326 32328 14ed621 32326->32328

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 57619e8-5761a1a 2 5761a20-5761a34 0->2 3 5761e2f-5761e4d 0->3 4 5761a36 2->4 5 5761a3b-5761af2 2->5 8 5762267-5762273 3->8 4->5 50 5761d71-5761d95 5->50 51 5761af8-5761b00 5->51 10 5761e5b-5761e67 8->10 11 5762279-576228d 8->11 12 5762254-5762259 10->12 13 5761e6d-5761eed 10->13 20 5762264 12->20 32 5761f05-5761f1e 13->32 33 5761eef-5761ef5 13->33 20->8 38 5761f20-5761f56 32->38 39 5761f5b-5761f99 32->39 34 5761ef7 33->34 35 5761ef9-5761efb 33->35 34->32 35->32 38->20 56 5761fbe-5761fcb 39->56 57 5761f9b-5761fbc 39->57 62 5761e19-5761e1f 50->62 54 5761b07-5761b0f 51->54 55 5761b02-5761b06 51->55 58 5761b14-5761b36 54->58 59 5761b11 54->59 55->54 67 5761fd2-5761fd8 56->67 57->67 69 5761b3b-5761b41 58->69 70 5761b38 58->70 59->58 64 5761e21 62->64 65 5761e2c 62->65 64->65 65->3 71 5761ff7-5762049 67->71 72 5761fda-5761ff5 67->72 73 5761b47-5761b61 69->73 74 5761cfb-5761d06 69->74 70->69 111 5762164-57621a3 71->111 112 576204f-5762054 71->112 72->71 78 5761b63-5761b67 73->78 79 5761ba1-5761baa 73->79 75 5761d0b-5761d41 74->75 76 5761d08 74->76 115 5761d43-5761d67 75->115 116 5761d69 75->116 76->75 78->79 84 5761b69-5761b71 78->84 81 5761e14 79->81 82 5761bb0-5761bc0 79->82 81->62 82->81 87 5761bc6-5761bd7 82->87 85 5761b77 84->85 86 5761bfa-5761c93 84->86 89 5761b7a-5761b7c 85->89 100 5761d9a-5761dae 86->100 101 5761c99-5761c9d 86->101 87->81 91 5761bdd-5761bed 87->91 93 5761b81-5761b8c 89->93 94 5761b7e 89->94 91->81 95 5761bf3-5761bf8 91->95 93->81 98 5761b92-5761b9d 93->98 94->93 95->86 98->89 102 5761b9f 98->102 100->81 104 5761db0-5761dca 100->104 101->100 105 5761ca3-5761cb1 101->105 102->86 104->81 109 5761dcc-5761de9 104->109 106 5761cb3 105->106 107 5761cf1-5761cf5 105->107 114 5761cb9-5761cbb 106->114 107->73 107->74 109->81 113 5761deb-5761e09 109->113 133 57621a5-57621bd 111->133 134 57621bf-57621ce 111->134 120 576205e-5762061 112->120 113->81 117 5761e0b 113->117 118 5761cc5-5761ce1 114->118 119 5761cbd-5761cc1 114->119 115->116 116->50 117->81 118->81 121 5761ce7-5761cef 118->121 119->118 124 5762067 120->124 125 576212c-5762154 120->125 121->107 121->114 126 57620d0-57620fc 124->126 127 576206e-576209a 124->127 128 57620fe-576212a 124->128 129 576209f-57620cb 124->129 131 576215a-576215e 125->131 126->131 127->131 128->131 129->131 131->111 131->120 137 57621d7-5762239 133->137 134->137 143 5762244-5762252 137->143 143->20
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq$TJhq$Tecq$pgq$xbfq
                          • API String ID: 0-2309367897
                          • Opcode ID: 8b50a228496e5f208240cf490013a2a2ccaaf9e09339630d1d6f441db40e9bbb
                          • Instruction ID: 124109df54c5f8e69d756dccb6abc0b3c54743e3e46aa5f3630cf30535d05973
                          • Opcode Fuzzy Hash: 8b50a228496e5f208240cf490013a2a2ccaaf9e09339630d1d6f441db40e9bbb
                          • Instruction Fuzzy Hash: 81521775A105149FDB19CF68C988E69BBB2FF88304F5681A8E5099B372CB31EC91DF50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2167 573eb2e-573eb3d call 5751420 2168 573eb43 2167->2168 2169 573ea8d-573eaa6 call 573d000 2168->2169 2172 573f894-573f898 2169->2172 2173 573eaac-573f71e call 5730c70 2169->2173 2175 573ea23-573ea3c call 573d000 2172->2175 2176 573f89e-573f8a9 2172->2176 2173->2172 2197 573f724 2173->2197 2187 573ea42-573fda7 call 5730c70 2175->2187 2188 573e88b-573e8b3 call 5730c70 call 573d000 2175->2188 2179 573e602-573e605 2176->2179 2180 573f8af-573f8b4 2176->2180 2183 573e60b-573ebc1 2179->2183 2184 573ef8d-573ef96 2179->2184 2180->2179 2183->2179 2199 573ebc7-573ebca 2183->2199 2185 573efa5-573efae 2184->2185 2186 573ef98-573ef9b 2184->2186 2189 573f915-573f941 call 5730c70 2185->2189 2186->2185 2215 573f279-573f286 call 573ba20 2187->2215 2216 573fdad 2187->2216 2209 573e936-573e93d 2188->2209 2210 573e8b9 2188->2210 2213 573e7b0-573e7da call 5730c70 2189->2213 2214 573f947-573f98c 2189->2214 2204 573f729-573f732 2197->2204 2199->2179 2205 573f741-573f75c 2204->2205 2206 573f734-573f737 2204->2206 2205->2179 2206->2205 2211 573e93f 2209->2211 2212 573e97e-573e9a9 call 5730c70 call 573d000 2209->2212 2210->2212 2220 573f7c9-573f7f2 call 5730c70 2211->2220 2245 573e75a-573f198 2212->2245 2246 573e9af-573f8f1 2212->2246 2213->2188 2244 573e7e0 2213->2244 2226 573f99b-573f9ab 2214->2226 2227 573f98e-573f991 2214->2227 2230 573fbca-573fbfe call 5730c70 2215->2230 2231 573f28c-573fb75 call 5730c70 2215->2231 2229 573ff4e-573ff5a 2216->2229 2220->2212 2248 573f7f8 2220->2248 2226->2213 2227->2226 2241 573ff61-573ff62 2229->2241 2242 573ff5c-573ff5e 2229->2242 2267 573e8f3-573e92b call 5730c70 2230->2267 2268 573fc04 2230->2268 2277 573fb7b 2231->2277 2278 573f79f-573f7a8 2231->2278 2252 573ff63-573ff64 2241->2252 2253 573ff69-573ff6a 2241->2253 2250 573ff60 2242->2250 2251 573ff65-573ff68 2242->2251 2260 573e71e-573e727 2244->2260 2261 573e73d 2244->2261 2262 573e9e8-573e9f1 2245->2262 2263 573f19e-573f325 call 57370d0 2245->2263 2246->2245 2264 573f8f7-573fd13 call 573d030 2246->2264 2266 573f86e-573f889 call 573cfa0 2248->2266 2250->2241 2251->2253 2252->2251 2258 573ff71-573ff73 2253->2258 2259 573ff6c-573ff6e 2253->2259 2270 573ff75-573ff76 2258->2270 2269 573ff70 2259->2269 2259->2270 2271 573e729-573e72c 2260->2271 2272 573e72e-573e731 2260->2272 2274 573e740-573e755 2261->2274 2262->2229 2265 573e9f7-573ea01 2262->2265 2300 573f0d3-573f0d5 2263->2300 2301 573f32b-573f90b 2263->2301 2264->2245 2316 573fd19 2264->2316 2265->2266 2266->2172 2292 573fca1-573fcd5 call 5730c70 2267->2292 2315 573e931-573ea50 2267->2315 2268->2292 2269->2258 2281 573ff78-573ff7a 2270->2281 2282 573ff7d-573ff7e 2270->2282 2280 573e73b 2271->2280 2272->2280 2274->2188 2277->2188 2290 573f7b7-573f7be 2278->2290 2291 573f7aa-573f7ad 2278->2291 2280->2274 2293 573ff81-573ff82 2281->2293 2294 573ff7c 2281->2294 2295 573ff85-573ff86 2282->2295 2296 573ff7f-573ff80 2282->2296 2290->2188 2303 573f7c4 2290->2303 2291->2290 2331 573ebf7-573ec20 call 5730c70 2292->2331 2332 573fcdb 2292->2332 2307 573ff89 2293->2307 2317 573ff84 2293->2317 2294->2282 2297 573ff87-573ff88 2295->2297 2298 573ff8d-573ff8e 2295->2298 2296->2293 2297->2307 2312 573ff90 2298->2312 2313 573ff95-573ff97 2298->2313 2308 573f795-573f797 2300->2308 2309 573f0db 2300->2309 2301->2189 2303->2220 2308->2278 2309->2308 2312->2297 2319 573ff92 2312->2319 2320 573ff99-573ff9e 2313->2320 2329 573ea52-573ea55 2315->2329 2330 573ea5f-573ea66 2315->2330 2328 573fd1e-573fd22 2316->2328 2317->2295 2319->2320 2323 573ff94 2319->2323 2325 573ffa0-573ffa4 2320->2325 2326 573ffa5-573ffa8 2320->2326 2323->2313 2325->2326 2328->2331 2334 573fd28-573fd39 2328->2334 2329->2330 2330->2292 2336 573ea6c 2330->2336 2340 573ec26 2331->2340 2341 573e9b4-573e9dd call 5730c70 2331->2341 2332->2328 2334->2179 2337 573fd3f-573fd42 2334->2337 2336->2169 2337->2179 2340->2204 2345 573e9e3-573ed4c 2341->2345 2346 573f9df-573fa10 call 5730c70 2341->2346 2350 573ed5b-573ed6b 2345->2350 2351 573ed4e-573ed51 2345->2351 2354 573fa16-573fa1b 2346->2354 2355 573f1b4-573f1e7 call 5730c70 2346->2355 2350->2346 2351->2350 2354->2179 2355->2189 2359 573f1ed-573fa8b 2355->2359 2361 573fa9a-573faa1 2359->2361 2362 573fa8d-573fa90 2359->2362 2361->2189 2363 573faa7-573fab5 2361->2363 2362->2361 2363->2179 2364 573fabb-573fabd 2363->2364 2364->2179
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: s
                          • API String ID: 0-453955339
                          • Opcode ID: 9e2b50f5269ad6c22cfc3cf1dbf44d28689a21817d0f8352cc9577b4eb5c9899
                          • Instruction ID: eb788a3cac3fb942ef4dcb90363c0aab1c821ba549731c6dbe2b22beeb6a8e3c
                          • Opcode Fuzzy Hash: 9e2b50f5269ad6c22cfc3cf1dbf44d28689a21817d0f8352cc9577b4eb5c9899
                          • Instruction Fuzzy Hash: 95126E74A04118CFCB14DF64C85ABAE7BB6BF48360F1580A5D8179B292DB34ED82EF51
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: \VNl
                          • API String ID: 0-3796923132
                          • Opcode ID: 65b02d9a5c1666e506cbf47bf8a6040ede3f333677b231838f7b8fc432785525
                          • Instruction ID: 7a24d3a4c0219b9a0d71e9c2aca7bab37da680a21ce14304a0f08c21e83d47d4
                          • Opcode Fuzzy Hash: 65b02d9a5c1666e506cbf47bf8a6040ede3f333677b231838f7b8fc432785525
                          • Instruction Fuzzy Hash: 9D9171B1E04209DFDF20CFA9C986BDDBBF2BF48324F148129E415AB255EB749845DB81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8ca6002ece5c657865504f3067c8be20a4068162fab1fac508555b125e7e0f89
                          • Instruction ID: 7fcdf6d03a7d2bd1eaddeb537b8ddd41bd264152433b8b0b0c33397e1204fde3
                          • Opcode Fuzzy Hash: 8ca6002ece5c657865504f3067c8be20a4068162fab1fac508555b125e7e0f89
                          • Instruction Fuzzy Hash: 67121A74B112299FCB64DF28C898AA9BBF2FF89300F508595D44A9B355DF30AD81CF41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4a3fb77b94908313ecfa016474174dbad614bb65e8d088f7ddbd2a7c86026138
                          • Instruction ID: ae143d9ac3f14a019c92467e152b404e3b917bace5f3e24f7bee90fe534c5285
                          • Opcode Fuzzy Hash: 4a3fb77b94908313ecfa016474174dbad614bb65e8d088f7ddbd2a7c86026138
                          • Instruction Fuzzy Hash: C9B16F71E04209EFDB10CFA9D8867ADBBF2FF48324F248129D815AB255EB749845DB81
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3487852902.00000000056F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_56f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq$4'cq
                          • API String ID: 0-60795322
                          • Opcode ID: 9e6b35d01a9b709eee84e7d2124fdb6e6e0e6442f04cd9e56851754564ed2c51
                          • Instruction ID: 76b65953082ebf045d9d8a4fefb493dcf1b27eb060bfca7ccb433e4e25c5fa51
                          • Opcode Fuzzy Hash: 9e6b35d01a9b709eee84e7d2124fdb6e6e0e6442f04cd9e56851754564ed2c51
                          • Instruction Fuzzy Hash: A3239170F112258FCB359B6C88A823E79F7BBD8A40F50856ADE06D7744DE308C42DB96

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1303 5755500-575556c 1307 5755753-57557ef 1303->1307 1308 5755572-5755576 1303->1308 1346 57557f1-57557fd 1307->1346 1347 5755809-5755835 1307->1347 1309 5755590-575559a 1308->1309 1310 5755578 1308->1310 1312 57555a0-57555a4 1309->1312 1317 5755662-57556ba 1309->1317 1310->1312 1314 57556c1-57556ed 1312->1314 1315 57555aa-57555c0 1312->1315 1334 57556f4-575574c 1314->1334 1327 5755560-5755564 1315->1327 1328 575563c-5755647 1315->1328 1317->1314 1331 5755566 1327->1331 1332 575557a-575565d call 5750470 1327->1332 1328->1334 1340 575564d 1328->1340 1335 5755537-5755552 call 5751e30 1331->1335 1361 57555ef-5755639 1332->1361 1362 575558e-5755625 1332->1362 1334->1307 1335->1332 1358 5755554-57555c4 1335->1358 1340->1327 1379 575583c-5755890 1346->1379 1387 57557ff-5755807 1346->1387 1347->1379 1367 57555cd-57555db 1358->1367 1373 575552b-575552e 1362->1373 1383 575562b-5755630 1362->1383 1372 57555e1-57555e3 1367->1372 1367->1373 1372->1373 1373->1332 1375 5755530 1373->1375 1375->1332 1375->1335 1380 57555e8-57555ec 1375->1380 1383->1373
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: (gq$(gq$(gq$(gq
                          • API String ID: 0-1248210538
                          • Opcode ID: f679c5677a746d0e007a81b967c3e3b387203f28d2a981df129d26d0126e683d
                          • Instruction ID: bf63d66d5ef7d3d7bb2386b23706745b6f76b69a555410c3f0e97ccf0ca422b5
                          • Opcode Fuzzy Hash: f679c5677a746d0e007a81b967c3e3b387203f28d2a981df129d26d0126e683d
                          • Instruction Fuzzy Hash: C3A1B031604245CFC725EF29D498A6E3BE3FF84320F558929E8078B251DFB4AC46DB85

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1394 5760040-57600a3 1397 57600a5 1394->1397 1398 57600b2-57600be 1394->1398 1616 57600ac call 5762702 1397->1616 1617 57600ac call 576271b 1397->1617 1399 57600c4-57600c9 1398->1399 1400 5760bef 1398->1400 1401 57600fc-5760141 1399->1401 1402 57600cb-57600d4 1399->1402 1404 5760bf4-5760bf8 1400->1404 1401->1400 1422 5760147-57602bb 1401->1422 1402->1400 1403 57600da-57600f7 1402->1403 1405 5760d60-5760d66 1403->1405 1407 5760bfa 1404->1407 1408 5760bab-5760bc2 1404->1408 1409 5760d8d 1405->1409 1410 5760d68-5760d84 1405->1410 1411 5760c23-5760c6a 1407->1411 1412 5760c01-5760c1e 1407->1412 1413 5760cfe-5760d24 1407->1413 1414 5760c6f-5760cb3 1407->1414 1415 5760cb8-5760cfc 1407->1415 1434 5760bcd-5760be4 1408->1434 1424 5760d8e 1409->1424 1410->1409 1433 5760d53-5760d5b 1411->1433 1412->1433 1435 5760d26-5760d3d 1413->1435 1436 5760d4d 1413->1436 1414->1433 1415->1433 1464 5760826-5760857 1422->1464 1465 57602c1-57602cd 1422->1465 1424->1424 1433->1405 1434->1400 1435->1400 1444 5760d43-5760d4b 1435->1444 1436->1433 1444->1435 1444->1436 1473 57608bc-57608ed 1464->1473 1474 5760859-5760885 1464->1474 1465->1400 1466 57602d3-576035d 1465->1466 1500 5760385-57603d4 1466->1500 1501 576035f-5760383 1466->1501 1484 57608f3-5760990 1473->1484 1485 5760a0f-5760a57 1473->1485 1486 5760887-576088a 1474->1486 1487 576089f-57608ba 1474->1487 1534 57609d2-57609d5 1484->1534 1535 5760992-57609d0 1484->1535 1494 5760ab4-5760af8 1485->1494 1495 5760a59-5760aae 1485->1495 1486->1487 1489 576088c-576089c 1486->1489 1487->1473 1487->1474 1489->1487 1515 5760b84-5760ba6 1494->1515 1516 5760afe-5760b43 1494->1516 1495->1494 1522 57603d6-57603db 1500->1522 1523 57603e0-576041d 1500->1523 1501->1500 1515->1405 1516->1434 1533 5760b49-5760b51 1516->1533 1525 576080e-5760820 1522->1525 1538 576041f-5760424 1523->1538 1539 5760429-5760465 1523->1539 1525->1464 1525->1465 1533->1400 1537 5760b57-5760b5e 1533->1537 1540 57609d7-57609e6 1534->1540 1541 57609e8 1534->1541 1545 57609f4-5760a09 1535->1545 1537->1404 1542 5760b64-5760b7e 1537->1542 1538->1525 1553 5760467-576046c 1539->1553 1554 5760471-57604b4 1539->1554 1540->1545 1541->1545 1542->1515 1542->1516 1545->1484 1545->1485 1553->1525 1559 57604b6-57604bb 1554->1559 1560 57604c0-5760503 1554->1560 1559->1525 1564 5760505-576050a 1560->1564 1565 576050f-5760552 1560->1565 1564->1525 1569 5760554-5760559 1565->1569 1570 576055e-57605a1 1565->1570 1569->1525 1574 57605a3-57605a8 1570->1574 1575 57605ad-57605e3 1570->1575 1574->1525 1579 57605e5-57605ea 1575->1579 1580 57605ef-576062c 1575->1580 1579->1525 1584 576062e-5760633 1580->1584 1585 5760638-576067b 1580->1585 1584->1525 1589 5760687-57606ca 1585->1589 1590 576067d-5760682 1585->1590 1594 57606d6-5760719 1589->1594 1595 57606cc-57606d1 1589->1595 1590->1525 1599 5760725-5760768 1594->1599 1600 576071b-5760720 1594->1600 1595->1525 1604 5760774-57607b7 1599->1604 1605 576076a-576076f 1599->1605 1600->1525 1609 57607c0-5760803 1604->1609 1610 57607b9-57607be 1604->1610 1605->1525 1614 5760805-576080a 1609->1614 1615 576080c 1609->1615 1610->1525 1614->1525 1615->1525 1616->1398 1617->1398
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 2$$cq
                          • API String ID: 0-1429447105
                          • Opcode ID: d2e8a9151e1cc98fe498f7232499e5491f6d701fe228ae48a2a274d2e94e6ed1
                          • Instruction ID: da3a8dd2dd72e55e10e1c89d9f57b9b09002dea8d43b35e6ef299f0a104b8273
                          • Opcode Fuzzy Hash: d2e8a9151e1cc98fe498f7232499e5491f6d701fe228ae48a2a274d2e94e6ed1
                          • Instruction Fuzzy Hash: 91722974A012198FCB55DF69D8987AEBBF2FB89300F1085AAD80A9B350DF349D85DF40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1618 56f4c40-56f4c57 1619 56f4c6f-56f4c71 1618->1619 1620 56f4c59-56f4c5f 1618->1620 1623 56f4f4a-56f4f55 1619->1623 1621 56f4c63-56f4c6d 1620->1621 1622 56f4c61 1620->1622 1621->1619 1622->1619 1626 56f4f5b-56f4f5d 1623->1626 1627 56f4c76-56f4c79 1623->1627 1628 56f4f5f-56f4f75 1626->1628 1629 56f4f7d-56f4f83 1626->1629 1630 56f4c7f-56f4c81 1627->1630 1631 56f4d18-56f4d1b 1627->1631 1628->1629 1632 56f4f87-56f4f93 1629->1632 1633 56f4f85 1629->1633 1634 56f4c83-56f4c99 1630->1634 1635 56f4ca1-56f4cb0 1630->1635 1636 56f4e1e-56f4e21 1631->1636 1637 56f4d21-56f4d23 1631->1637 1639 56f4f95-56f4f9e 1632->1639 1633->1639 1634->1635 1653 56f4ccd-56f4cd5 1635->1653 1654 56f4cb2-56f4ccb 1635->1654 1640 56f4e64-56f4e67 1636->1640 1641 56f4e23-56f4e25 1636->1641 1642 56f4d25-56f4d3b 1637->1642 1643 56f4d43-56f4d52 1637->1643 1646 56f4eaa-56f4ead 1640->1646 1647 56f4e69-56f4e6b 1640->1647 1649 56f4e27-56f4e3d 1641->1649 1650 56f4e45-56f4e4f 1641->1650 1642->1643 1662 56f4d6f-56f4d7a 1643->1662 1663 56f4d54-56f4d6d 1643->1663 1656 56f4eaf-56f4eb1 1646->1656 1657 56f4ee5-56f4ee8 1646->1657 1658 56f4e6d-56f4e83 1647->1658 1659 56f4e8b-56f4e95 1647->1659 1649->1650 1650->1623 1669 56f4e55-56f4e5f 1650->1669 1685 56f4cd8-56f4cda call 5c0cb70 1653->1685 1654->1653 1667 56f4eb3-56f4ec9 1656->1667 1668 56f4ed1-56f4ee3 1656->1668 1665 56f4eea-56f4eec 1657->1665 1666 56f4f20-56f4f22 1657->1666 1658->1659 1659->1623 1681 56f4e9b-56f4ea5 1659->1681 1692 56f4d7c-56f4d84 1662->1692 1693 56f4da9-56f4dac 1662->1693 1663->1662 1670 56f4eee-56f4f04 1665->1670 1671 56f4f0c-56f4f1e 1665->1671 1674 56f4f24-56f4f3a 1666->1674 1675 56f4f42 1666->1675 1667->1668 1668->1623 1669->1623 1670->1671 1671->1623 1674->1675 1675->1623 1681->1623 1694 56f4ce0-56f4cf6 1685->1694 1704 56f4d87-56f4da5 1692->1704 1701 56f4db3-56f4dcd 1693->1701 1694->1685 1711 56f4cf8-56f4cfb 1694->1711 1709 56f4dcf-56f4dee 1701->1709 1710 56f4df0-56f4df6 1701->1710 1724 56f4da7 1704->1724 1709->1701 1716 56f4dfe-56f4e01 1710->1716 1713 56f4cfd-56f4cff 1711->1713 1714 56f4d01 1711->1714 1717 56f4d03-56f4d05 1713->1717 1714->1717 1718 56f4e07 1716->1718 1719 56f4e03-56f4e05 1716->1719 1717->1623 1721 56f4d0b-56f4d13 1717->1721 1723 56f4e09-56f4e0b 1718->1723 1719->1723 1721->1623 1723->1623 1725 56f4e11-56f4e19 1723->1725 1724->1716 1725->1623
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3487852902.00000000056F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_56f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq$4'cq
                          • API String ID: 0-60795322
                          • Opcode ID: 7eb32078ad9471879a39cd3c05889db5c1403e83b2df1fc66e4e86f1f50f0154
                          • Instruction ID: dca8bf12d286dd2e0437eee2303cfdb6b27be9f482b7526b1d8b864c3f1d43ea
                          • Opcode Fuzzy Hash: 7eb32078ad9471879a39cd3c05889db5c1403e83b2df1fc66e4e86f1f50f0154
                          • Instruction Fuzzy Hash: BF919C34F203168B8F59AB6D949953E7AB3FFC42427648029E907D7B50EF348C42DB49

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1729 5c07221-5c07258 1732 5c0726a-5c07270 1729->1732 1733 5c072d1-5c072d7 1732->1733 1734 5c07272-5c073eb 1732->1734 1736 5c072d9 1733->1736 1737 5c072dd-5c072e3 1733->1737 1734->1733 1736->1737 1738 5c072e5 1737->1738 1739 5c072e9-5c072ef 1737->1739 1738->1739 1740 5c072f1-5c072f4 1739->1740 1741 5c072f6-5c072fa 1739->1741 1740->1741 1742 5c07300-5c0730a 1740->1742 1741->1742 1743 5c074d7-5c0752c 1741->1743 1746 5c0731a-5c07325 1742->1746 1747 5c0730c-5c07312 1742->1747 1773 5c07533-5c0759e 1743->1773 1750 5c0725a-5c0725d 1746->1750 1748 5c07318 1747->1748 1749 5c0742c-5c0746d 1747->1749 1748->1746 1777 5c07474-5c074d0 1749->1777 1753 5c07263 1750->1753 1754 5c073d5-5c073d8 1750->1754 1753->1732 1753->1754 1756 5c07277-5c0728c 1753->1756 1757 5c073da-5c073e0 1753->1757 1760 5c07377-5c07386 1754->1760 1761 5c073f9-5c07425 1754->1761 1768 5c072b8-5c072bc 1756->1768 1769 5c0728e-5c072b2 1756->1769 1757->1754 1762 5c073e2 1757->1762 1760->1773 1774 5c0738c-5c073a9 1760->1774 1761->1749 1762->1750 1771 5c07368-5c0736a 1762->1771 1776 5c072c2-5c072c9 1768->1776 1768->1777 1769->1768 1789 5c073f0-5c073f4 1769->1789 1771->1750 1774->1776 1794 5c073af-5c073bf 1774->1794 1777->1743 1789->1768 1800 5c073c8-5c073d0 1794->1800 1800->1768 1806 5c07332-5c07340 1800->1806 1806->1750 1807 5c07346-5c0734b 1806->1807 1807->1750
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: (gq$Hgq
                          • API String ID: 0-3303014377
                          • Opcode ID: 9df83a38c79288e9a4299c6b10764c933bc0178b051fc7d0c942347c52a4e606
                          • Instruction ID: cbed54fd26301453e0df9a8f4615ae97d8f5e2024645b0565ae6c156719ac1d0
                          • Opcode Fuzzy Hash: 9df83a38c79288e9a4299c6b10764c933bc0178b051fc7d0c942347c52a4e606
                          • Instruction Fuzzy Hash: 2091BD303046518FCB29DF7AD458A6F7BE2FF84220F059A2DD8568B291DB34FD458B91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1808 5c07aa0-5c07aed call 5c04590 1891 5c07af0 call 5c08090 1808->1891 1892 5c07af0 call 5c08047 1808->1892 1813 5c07af6-5c07b3b 1821 5c07b41-5c07b74 1813->1821 1822 5c07b3d-5c07b3f 1813->1822 1823 5c07b7b-5c07b82 1821->1823 1822->1823 1825 5c07b84-5c07fe3 call 5c01050 * 2 1823->1825 1826 5c07ba8-5c07de6 call 5c00cd0 1823->1826 1842 5c07d44-5c07d4f call 5c085c0 1826->1842 1843 5c07e05-5c07f07 1826->1843 1848 5c07cc0-5c07cc3 1842->1848 1850 5c07e29-5c07efa call 5c00cd0 1843->1850 1848->1843 1865 5c07e70-5c07f6e 1850->1865 1866 5c07f74-5c07f85 call 5c00cd0 1850->1866 1865->1866 1879 5c07e1a-5c07e24 1865->1879 1884 5c07e15-5c07fa3 1866->1884 1885 5c07f37 1866->1885 1879->1850 1879->1866 1888 5c07fb3 1884->1888 1889 5c07fa5-5c07fab 1884->1889 1885->1884 1890 5c07fb4 1888->1890 1889->1888 1890->1890 1891->1813 1892->1813
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq$4'cq
                          • API String ID: 0-60795322
                          • Opcode ID: d620e54141c830416fd28019024dc5088923bcd3db428762fddfcd2664fe1612
                          • Instruction ID: 997212152b32fe79f371da453c0fde115899255219dff8a7450b20012496a5c7
                          • Opcode Fuzzy Hash: d620e54141c830416fd28019024dc5088923bcd3db428762fddfcd2664fe1612
                          • Instruction Fuzzy Hash: 57910F35E14118DFCB18EBA5D898AADB7B2FF88300F505919E812A7394DF706D42DB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1894 5751420-5751430 1895 5751435-5751438 1894->1895 1896 57515a7-57515d3 1895->1896 1897 575143e 1895->1897 1914 57515da-575167a 1896->1914 1897->1896 1898 5751460-5751480 1897->1898 1899 5751553-5751555 1897->1899 1901 5751483-5751485 1899->1901 1902 575155b-5751569 1899->1902 1904 57516c9-5751770 1901->1904 1905 575148b-57514b1 1901->1905 1902->1895 1906 575156f-5751571 1902->1906 1915 57514b7-57514dd 1905->1915 1916 5751576-575159c 1905->1916 1906->1895 1926 5751681-57516c2 1914->1926 1915->1926 1927 57514e3-57514ee call 5751378 1915->1927 1916->1926 1928 57515a2 1916->1928 1926->1904 1927->1914 1934 57514f4-575153c call 5751800 1927->1934 1928->1915 1955 5751544-5751548 1934->1955 1955->1898 1956 575154e 1955->1956 1956->1899
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: (gq$Hgq
                          • API String ID: 0-3303014377
                          • Opcode ID: 4e20390ab7adde4795856d7e85c4a585fff265e49d32fb0e975818fca74ea558
                          • Instruction ID: 03d4b7eddfed85fe13a7b46d11dd19171f2042d55c453f91ffb5f6d972f70f99
                          • Opcode Fuzzy Hash: 4e20390ab7adde4795856d7e85c4a585fff265e49d32fb0e975818fca74ea558
                          • Instruction Fuzzy Hash: CD81C7347002148FC729EF68D458A6F7BB2FF89220B64892DD8478B391DF34AC46DB81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1958 5753850-5753851 1959 5753d1e-5753d21 1958->1959 1960 5753e09-5753e1b 1958->1960 1962 5753d27-5754454 1959->1962 1963 5753f6b-5753f6f 1959->1963 1966 5753d87-5753daa call 5750f40 1960->1966 1967 5753e21 1960->1967 1962->1959 1978 575445a-575445d 1962->1978 1964 5753f75-5753f86 1963->1964 1965 5753eee-5753fc6 call 5753630 1963->1965 1964->1959 1971 5753f8c-5753f8e 1964->1971 1989 5753de1-5753de7 1965->1989 1990 5753fcc 1965->1990 1981 5753db0 1966->1981 1982 5754323-575434b call 5750f40 1966->1982 1968 5753f93-5753f9c 1967->1968 1969 5753dd2-5753ddc 1967->1969 1969->1968 1971->1959 1971->1968 1978->1959 1984 575428d-5754296 1981->1984 1982->1968 1998 5754351-57543b8 1982->1998 1986 57542a5-57542c4 1984->1986 1987 5754298-575429b 1984->1987 1986->1959 2000 57542ca 1986->2000 1987->1986 1993 5753ded-5753f2c call 57537a0 1989->1993 1994 575456f-57545b6 call 57537a0 call 5753970 1989->1994 1990->1984 1996 57544b1-57544d7 call 5750f40 1990->1996 1993->1994 2010 5753f32-5753f4d 1993->2010 2016 57545bb-57545bf 1994->2016 1996->1989 2015 57544dd 1996->2015 2005 57543c7-57543e8 1998->2005 2006 57543ba-57543bd 1998->2006 2000->1959 2005->1959 2017 57543ee-57543f1 2005->2017 2006->2005 2018 57545c9-57545cb 2010->2018 2020 57545c1 call 5755500 2016->2020 2021 57545c1 call 57554f0 2016->2021 2017->1959 2019 57545c7 2019->2018 2020->2019 2021->2019
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: (_cq$d
                          • API String ID: 0-669606031
                          • Opcode ID: a3bb8374c652f41cc28b5d5c8c18675b61d7b46667ef9c163d5b0db0651c1bcd
                          • Instruction ID: 11eb75a7af3b749183bd6ab6be72539d66c3b8b7a1bd6915d7dc37c282436bf1
                          • Opcode Fuzzy Hash: a3bb8374c652f41cc28b5d5c8c18675b61d7b46667ef9c163d5b0db0651c1bcd
                          • Instruction Fuzzy Hash: CF515F74A04204DFCB18DFA9D488AAEBBF3FF44360F154469E9069B2A4DF719D81EB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2022 5c07b9f-5c07de6 call 5c00cd0 2029 5c07d44-5c07d4f call 5c085c0 2022->2029 2030 5c07e05-5c07f07 2022->2030 2035 5c07cc0-5c07cc3 2029->2035 2037 5c07e29-5c07efa call 5c00cd0 2030->2037 2035->2030 2052 5c07e70-5c07f6e 2037->2052 2053 5c07f74-5c07f85 call 5c00cd0 2037->2053 2052->2053 2066 5c07e1a-5c07e24 2052->2066 2071 5c07e15-5c07fa3 2053->2071 2072 5c07f37 2053->2072 2066->2037 2066->2053 2075 5c07fb3 2071->2075 2076 5c07fa5-5c07fab 2071->2076 2072->2071 2077 5c07fb4 2075->2077 2076->2075 2077->2077
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq$4'cq
                          • API String ID: 0-60795322
                          • Opcode ID: cae3c5e6aa5bb5952d2746e7ef5202ab08d77a238cbff282c0a19b94c4b3cbda
                          • Instruction ID: 019984bcaa0de011d70996b1100defe145ef374cd74691c678c5cee455202de9
                          • Opcode Fuzzy Hash: cae3c5e6aa5bb5952d2746e7ef5202ab08d77a238cbff282c0a19b94c4b3cbda
                          • Instruction Fuzzy Hash: 11514D34A14218CFCB0CEBA5D898AADB7B3FF88300F515915E8126B2A4DF707D42DB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2079 573bcc0-573bcc3 2080 573bcc5 2079->2080 2081 573bcc9-573bcfb 2079->2081 2080->2081 2082 573be95-573beb5 2080->2082 2090 573be60-573be7b 2081->2090 2087 573beb7-573bec7 2082->2087 2088 573bf28-573bf2c 2082->2088 2093 573bf46-573bfb5 2088->2093 2094 573bf2e-573bf34 2088->2094 2098 573be84-573be86 2090->2098 2105 573bfb2 2093->2105 2106 573bf0d-573bf13 2093->2106 2095 573bf36 2094->2095 2096 573bf38-573bf44 2094->2096 2095->2093 2096->2093 2099 573be88 2098->2099 2100 573be0d-573be0f 2098->2100 2099->2082 2100->2090 2107 573bfbb-573bfd5 2106->2107 2108 573bf19-573bf27 2106->2108 2112 573bfd7-573c000 2107->2112 2113 573c048-573c04e 2107->2113 2108->2088 2112->2113 2114 573c050-573c058 2113->2114 2115 573c055 2113->2115 2117 573c05d-573c05e 2114->2117 2115->2117
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: p`cq$p`cq
                          • API String ID: 0-3256509546
                          • Opcode ID: dfe537116085ad4fd330c0bab6e8eca025fa930037f744259ac10822129f4f61
                          • Instruction ID: 2f633bedea2b0df126ea6d898a23863f5c9663b14857a990cb3b310fd2ccd563
                          • Opcode Fuzzy Hash: dfe537116085ad4fd330c0bab6e8eca025fa930037f744259ac10822129f4f61
                          • Instruction Fuzzy Hash: 7A417BB5A083498FCB01DBA8D8865BEBFB1FF46320B1440EBD1099B363CA344C05DB52

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2121 5c07cb0-5c07cc3 2122 5c07e05-5c07f07 2121->2122 2126 5c07e29-5c07efa call 5c00cd0 2122->2126 2141 5c07e70-5c07f6e 2126->2141 2142 5c07f74-5c07f85 call 5c00cd0 2126->2142 2141->2142 2155 5c07e1a-5c07e24 2141->2155 2160 5c07e15-5c07fa3 2142->2160 2161 5c07f37 2142->2161 2155->2126 2155->2142 2164 5c07fb3 2160->2164 2165 5c07fa5-5c07fab 2160->2165 2161->2160 2166 5c07fb4 2164->2166 2165->2164 2166->2166
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq$4'cq
                          • API String ID: 0-60795322
                          • Opcode ID: eb9f8abeea467e5073d775ce5d671a2e2cae2dbfe264da02947de49409af89d5
                          • Instruction ID: 7095443641ceb53068f6d2c088a5d4539f38dedeccfc1372504dc6d05cd8b639
                          • Opcode Fuzzy Hash: eb9f8abeea467e5073d775ce5d671a2e2cae2dbfe264da02947de49409af89d5
                          • Instruction Fuzzy Hash: 3E413D35A15208CFCB0CEBA5D898AADB7B3FF84300F519915D8126B294EF706D42DB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2366 14ed3e0-14ed461 VirtualProtect 2369 14ed46a-14ed48f 2366->2369 2370 14ed463-14ed469 2366->2370 2370->2369
                          APIs
                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 014ED454
                          Memory Dump Source
                          • Source File: 00000004.00000002.3476494855.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_14e0000_InstallUtil.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: a3bc2cbf2129d276cc0dcc684aef123362e15a472dd5d3dae5425cfe9acd5c63
                          • Instruction ID: e5ffeef7320c8153ce3a7f05229953a5be9a9c7680f50d12f2fb635bb6ed8380
                          • Opcode Fuzzy Hash: a3bc2cbf2129d276cc0dcc684aef123362e15a472dd5d3dae5425cfe9acd5c63
                          • Instruction Fuzzy Hash: 9211F4B1D002499FDB10DFAAC884AEEFBF4EF58320F14842AD519A7250CB75A945CFA1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2374 14ed5b0-14ed61f FindCloseChangeNotification 2377 14ed628-14ed64d 2374->2377 2378 14ed621-14ed627 2374->2378 2378->2377
                          APIs
                          • FindCloseChangeNotification.KERNELBASE ref: 014ED612
                          Memory Dump Source
                          • Source File: 00000004.00000002.3476494855.00000000014E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014E0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_14e0000_InstallUtil.jbxd
                          Similarity
                          • API ID: ChangeCloseFindNotification
                          • String ID:
                          • API String ID: 2591292051-0
                          • Opcode ID: d220131bf466a1dfcfbb5740fa3bff182506e93df71488d264ef4a756a748698
                          • Instruction ID: f68e3e51349694833beb43a209f6191d0cbd65dd702e98057bd01474882de37b
                          • Opcode Fuzzy Hash: d220131bf466a1dfcfbb5740fa3bff182506e93df71488d264ef4a756a748698
                          • Instruction Fuzzy Hash: A01128B1D002498FDB20DFAAC84979EFBF4EF88324F14841AD519A7240CB756944CFA4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2382 5730c70-5730c95 2384 5730c97-5730cf5 2382->2384 2385 5730cfe-5730d05 2382->2385 2449 5730cf8 call 5730c63 2384->2449 2450 5730cf8 call 5730c70 2384->2450 2451 5730cf8 call 5730f30 2384->2451 2452 5730cf8 call 5730fc8 2384->2452 2453 5730cf8 call 5730fb8 2384->2453 2386 5730de6-5730df7 2385->2386 2387 5730d0b-5730d72 2385->2387 2389 5730df9 2386->2389 2390 5730dfe-5730e21 2386->2390 2422 5730de0 2387->2422 2423 5730d74-5730db3 2387->2423 2389->2390 2397 5730e93-5730f2e 2390->2397 2398 5730e23-5730e2c 2390->2398 2410 5730f4f-5730f55 2397->2410 2400 5730e3b-5730e41 2398->2400 2401 5730e2e-5730e33 2398->2401 2405 5730e47-5730e4e 2400->2405 2406 5730f4a 2400->2406 2401->2400 2405->2397 2408 5730e50-5730e59 2405->2408 2406->2410 2412 5730e5b-5730e60 2408->2412 2413 5730e68-5730e6e 2408->2413 2414 5730f57 2410->2414 2415 5730f5f 2410->2415 2412->2413 2413->2406 2417 5730e74-5730e8e 2413->2417 2414->2415 2420 5730f96-5730fc2 2415->2420 2417->2410 2433 5730fc4-5730fc7 2420->2433 2434 5730fc9-5731016 call 14ee120 2420->2434 2422->2386 2439 5730dd6-5730dda 2423->2439 2440 5730db5-5730dc5 2423->2440 2433->2434 2439->2420 2439->2422 2444 5730dd0-5730dd4 2440->2444 2445 5730dc7-5730dce 2440->2445 2444->2439 2444->2440 2445->2439 2449->2385 2450->2385 2451->2385 2452->2385 2453->2385
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: Djq
                          • API String ID: 0-3204991199
                          • Opcode ID: 5abea09fb6983086a1c38a60c206b8a8a1e5638ba29645762e5e420c1e07f45d
                          • Instruction ID: 31dd32f20e6d7589db6c8e1308af46847bca7045fc0874883fb2280a64e0a15e
                          • Opcode Fuzzy Hash: 5abea09fb6983086a1c38a60c206b8a8a1e5638ba29645762e5e420c1e07f45d
                          • Instruction Fuzzy Hash: 58A19E746046159FC718DF69D459B6ABBF2FF88310F118569E40AAB3A2DB30EC41CB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: (gq
                          • API String ID: 0-1972435379
                          • Opcode ID: 6bd0a980b39f850f894fbb4de1e294d6a899fdfeb468dcea88d69d6f628422f9
                          • Instruction ID: 8f17ea9ff069078260c479a4172532feaf70e46a0607fb57365a46958e25edbf
                          • Opcode Fuzzy Hash: 6bd0a980b39f850f894fbb4de1e294d6a899fdfeb468dcea88d69d6f628422f9
                          • Instruction Fuzzy Hash: 3291DF35A08309CFCB14CF69C845AAEFBF2FF85314F10995AD516A7680D734AD42CB91
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: \VNl
                          • API String ID: 0-3796923132
                          • Opcode ID: 1bcf6f15d68e29534c5c5d8f2bc7dd13b47833753415c56bee4e00b0fa846645
                          • Instruction ID: 55025f733173379ebb5bc572677cb63c5f8ed887744c0a2f040e34d07c43d328
                          • Opcode Fuzzy Hash: 1bcf6f15d68e29534c5c5d8f2bc7dd13b47833753415c56bee4e00b0fa846645
                          • Instruction Fuzzy Hash: 0F917FB1E04209DFDF20CFA9C986BDDBBF2BF48324F148129E815AB255DB749845DB81
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: pgq
                          • API String ID: 0-2504880937
                          • Opcode ID: 3b5bd4b8f2ba40bbec503a5b594defa799f321b26b458f4b1babf76a6a09bbe0
                          • Instruction ID: 41faa6ae1a2d8152635fb28c8af8063f5458a05be2595dac96b081dd698afe97
                          • Opcode Fuzzy Hash: 3b5bd4b8f2ba40bbec503a5b594defa799f321b26b458f4b1babf76a6a09bbe0
                          • Instruction Fuzzy Hash: 20719236204110EFCB06DFA9D819D6A7BB7FF9C3207158099E20A8B272CF35DC52AB51
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: pgq
                          • API String ID: 0-2504880937
                          • Opcode ID: b640a5275b7c29ff6aa93aa037dadf5eeafc3179ddb0cf0a5242ff8bc78e91af
                          • Instruction ID: affdb8d21c81fefc86e620bdd2442a8c644ee5a5504674b425c3aafed92ec4e2
                          • Opcode Fuzzy Hash: b640a5275b7c29ff6aa93aa037dadf5eeafc3179ddb0cf0a5242ff8bc78e91af
                          • Instruction Fuzzy Hash: EA718376604110AFCB06DFA8D819D6A7BB3FF9D3107168099E2469B2B2CF35DC12EB51
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: $cq
                          • API String ID: 0-2110363268
                          • Opcode ID: 68c6d7334082751403a2ecdd6eaf8bf145c37b220f2382cc27dae23dbece505e
                          • Instruction ID: 34996b190bfae89d1ffabad9e592959b43d42d42751fdd4537f2fabcfa2c4976
                          • Opcode Fuzzy Hash: 68c6d7334082751403a2ecdd6eaf8bf145c37b220f2382cc27dae23dbece505e
                          • Instruction Fuzzy Hash: 1F51E271B082199FCF19DB64D858ABF77B3FB88320F10812ADD0697285DB74AD82D781
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: Djq
                          • API String ID: 0-3204991199
                          • Opcode ID: b0bfb3ff0a79d69379a42086508cb57a5e3b7477bbe8a141d75dee8045e8a642
                          • Instruction ID: 017c43716c6a11ae1901084258683704e3ceac21cd8cf7bc0a45e099080fb23c
                          • Opcode Fuzzy Hash: b0bfb3ff0a79d69379a42086508cb57a5e3b7477bbe8a141d75dee8045e8a642
                          • Instruction Fuzzy Hash: 85619F756006119FC714DF29D488A69BBF2FF88320B5581A8E80AEB362DB30FC45CF80
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: (gq
                          • API String ID: 0-1972435379
                          • Opcode ID: d30684a3df381dd2500e9160979c80a10d9cc06f136bd35d7c28323707b49914
                          • Instruction ID: 25283fcde3338623dde5754fc3f473a073b86bfa37bc577d4c5483b4e6faaa9a
                          • Opcode Fuzzy Hash: d30684a3df381dd2500e9160979c80a10d9cc06f136bd35d7c28323707b49914
                          • Instruction Fuzzy Hash: C7419FB1A00616CFCB01CF58C486A6AFBB5FF49320F558699E565AB292C730FC55CBD0
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq
                          • API String ID: 0-182294849
                          • Opcode ID: 18941f2ec76d823d391948701fbf0418a0ae2ab007706fcd7a2e1d16ef7af6eb
                          • Instruction ID: 69518f4302b0c04df5428af3138284a768c170bca1143b87b71b61a509087d67
                          • Opcode Fuzzy Hash: 18941f2ec76d823d391948701fbf0418a0ae2ab007706fcd7a2e1d16ef7af6eb
                          • Instruction Fuzzy Hash: C631A0B47045009FD709EB79986DA3F76EBEBC8610B104429E80BC73C5CEB4AC428794
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq
                          • API String ID: 0-2449534970
                          • Opcode ID: 417138a70a2378af920930e7e4750fe6883f7b39d8bc63c7cb8b85fd1aa6a1ae
                          • Instruction ID: 2bb0848b40f27a590c0c802bfbb3b87543731ed0aad8a83ea5586066374a413a
                          • Opcode Fuzzy Hash: 417138a70a2378af920930e7e4750fe6883f7b39d8bc63c7cb8b85fd1aa6a1ae
                          • Instruction Fuzzy Hash: 8D31A3393141249FD72AEB68E05877F3AA3FBD9614F244129E5039B394CF789C4687D2
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: p<cq
                          • API String ID: 0-249043642
                          • Opcode ID: 002bb8bb47a34e5bff8cda54d769a431cfea724413da9835cb51d10022e41ae7
                          • Instruction ID: 1627ab29b1536ee0340342b498270b389839b900b19b6836f82d29dc5c162276
                          • Opcode Fuzzy Hash: 002bb8bb47a34e5bff8cda54d769a431cfea724413da9835cb51d10022e41ae7
                          • Instruction Fuzzy Hash: D6319578308254DFCB15CEA9C8546AA3BE6FF89320F044466FD16C7252CBB5EC41EB61
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: p<cq
                          • API String ID: 0-249043642
                          • Opcode ID: 4962aab57fa594c2ade94c2e2d08af367d03db096880e939c10293c6a3679d60
                          • Instruction ID: 53910a105b731169c234c1b6314877804e2c8e9a4e236a829f50c19426e019be
                          • Opcode Fuzzy Hash: 4962aab57fa594c2ade94c2e2d08af367d03db096880e939c10293c6a3679d60
                          • Instruction Fuzzy Hash: 892194797082449FCB15DEA9C844AAA3BE6FF89320F144465FD0687262CA74EC41EB64
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3487852902.00000000056F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_56f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq
                          • API String ID: 0-182294849
                          • Opcode ID: a97480bebd109e0fc8f9cf6ef091121a808dd0957acf56b09f29346bb9a2f06e
                          • Instruction ID: 8213ce876a83ae465c20fc84b77464f16ea908ca9290e295db26d6dc70d59e23
                          • Opcode Fuzzy Hash: a97480bebd109e0fc8f9cf6ef091121a808dd0957acf56b09f29346bb9a2f06e
                          • Instruction Fuzzy Hash: AB11DA35F093648FCF168724DCA426E7B76BF83211F0504EAD551AB782CB754C45CB41
                          Strings
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: Tecq
                          • API String ID: 0-1122318316
                          • Opcode ID: 1430f2bc6399733daa2ff33a0b08e36d3d25342e2957f00ee0dcbb943f1841ca
                          • Instruction ID: d992f4dd6b9166a0706aeb23c42ba0a311dae87aae4ddf5b31b2bf86b644b2a5
                          • Opcode Fuzzy Hash: 1430f2bc6399733daa2ff33a0b08e36d3d25342e2957f00ee0dcbb943f1841ca
                          • Instruction Fuzzy Hash: FD01D8357152148BCB05EB68C5197AE77F3AB88720F250129E402BB3C2CFB50D06D7D6
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0183605d14ef450cb46fb1637dfc556dab58b1c328e8fa60e94cedf5aabca147
                          • Instruction ID: 078c9c9aa97024df24bf2d75508196e3f9aa21cbbb6858faa323de6e85ce2565
                          • Opcode Fuzzy Hash: 0183605d14ef450cb46fb1637dfc556dab58b1c328e8fa60e94cedf5aabca147
                          • Instruction Fuzzy Hash: 42B18D747142148FD768EB79E55A62E3BB3FB88711F108028E4079B395CF749E82EB85
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5541bdeee21288ecfd52b2fe94b6c762e4af70bb5910e485dd65e3cc06299b5c
                          • Instruction ID: 253dfeddbe8f46f3245520293518ea7a05415ca79aecedd4d2725af9cb0f1014
                          • Opcode Fuzzy Hash: 5541bdeee21288ecfd52b2fe94b6c762e4af70bb5910e485dd65e3cc06299b5c
                          • Instruction Fuzzy Hash: 20B1B070B14215CFCB68EB79D55966E3BB2FB88711B208128E40297395CF349E82DF85
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 93be69f69fc21e01b06d7c179081490db8dbdbcca2dbff37d8e071c31a73ee3f
                          • Instruction ID: 27da27be738310a951ff8f46fe16d6a0c048d10ff9ff0937139999c44539422f
                          • Opcode Fuzzy Hash: 93be69f69fc21e01b06d7c179081490db8dbdbcca2dbff37d8e071c31a73ee3f
                          • Instruction Fuzzy Hash: 26B17E70E04209EFDB10CFA9D886B9DBBF2FF48724F248129D815EB255EB749845DB81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a323c7e0040ce8e5c001aab57c505613ac6ab3dbbd213b334519f4a884736c60
                          • Instruction ID: f23e62eed62e599a9e86ed1a0d23acac40cd1bed0e8673d3ca8247a28cf93f41
                          • Opcode Fuzzy Hash: a323c7e0040ce8e5c001aab57c505613ac6ab3dbbd213b334519f4a884736c60
                          • Instruction Fuzzy Hash: 1B917D34B14229CBCB5CEFB5D4586BE7AA7BB95300F604829D90BAB380DF359C45AB11
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3f8d3e4a2267c3619fb3e22ac6df2ceb0e505f579ea8e602445472a583edd5a1
                          • Instruction ID: f95f8cae86b1737e5bc5830ca6203a9f32bbd8d57ef07d45767de7dc1b26dbbc
                          • Opcode Fuzzy Hash: 3f8d3e4a2267c3619fb3e22ac6df2ceb0e505f579ea8e602445472a583edd5a1
                          • Instruction Fuzzy Hash: 7A918F30B04214CFCF19EF65D498A6E77B6FF84210F116969EA06AB3D1DB70AD41CB91
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4895b609e51cbb1049786f3648ab97be04b48df6f0a31493749b5e78bafefcc7
                          • Instruction ID: b50ace8245c5a0161ac65b2bc85e16931fffaeed599b571ab13727dd1473e30f
                          • Opcode Fuzzy Hash: 4895b609e51cbb1049786f3648ab97be04b48df6f0a31493749b5e78bafefcc7
                          • Instruction Fuzzy Hash: D7814C74B04219CFCB14EFA4D4949AE7BB6FF88320F648529D8069B354DFB4AC46DB90
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 61a1a92b9d37fab8ada64df79d95376b17efea61ec137c5b1a6915bdb61bb610
                          • Instruction ID: d84ce1ec4c3d82187a860add3b843ac5774d5c9a99fe133de9b4034b5d0672e6
                          • Opcode Fuzzy Hash: 61a1a92b9d37fab8ada64df79d95376b17efea61ec137c5b1a6915bdb61bb610
                          • Instruction Fuzzy Hash: F5715534A14248DFCB14EFA5E458AADBB73FF85710F109D29E80267294DFB0AD85CB81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d538ba6ef08b06561f7255ba21ca484593080c1a52640da76540a52936e1f712
                          • Instruction ID: c39324a04c379fcb9d412fda6d2a2291c5b757449357c8ca0e67ab2d950bb4bd
                          • Opcode Fuzzy Hash: d538ba6ef08b06561f7255ba21ca484593080c1a52640da76540a52936e1f712
                          • Instruction Fuzzy Hash: BA51D134708281CFCB05DB69D458B7A7BB3BB85B00F149EAAD416876D1CF75AD82CB81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 311b965606162d1ee98bd1b6b7c53cd780c5af7dc728ecedcefeca73dad0b0cf
                          • Instruction ID: 2e9699c3f382b13fc768cf87ca8d0dd16440d5c88afeb4807d43f43f94a4f9cc
                          • Opcode Fuzzy Hash: 311b965606162d1ee98bd1b6b7c53cd780c5af7dc728ecedcefeca73dad0b0cf
                          • Instruction Fuzzy Hash: A161237A554100EFEB4B9F85DD08DA5BFA3FF0832430A94D5E2095B172C632D8A5FB42
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a3bc5427a7118bdcfb877241562a8856ac375ae09f209b6540c8f8db694317fc
                          • Instruction ID: 74a61a7092b404f04a0b96d29ed5bcf9c0592b0f77e9e68f1af9193b325db6d1
                          • Opcode Fuzzy Hash: a3bc5427a7118bdcfb877241562a8856ac375ae09f209b6540c8f8db694317fc
                          • Instruction Fuzzy Hash: 79514E70B14214DFCF08DF65D498A6EB7B6FF88210F106569EA06AB3D4DB70AD42CB91
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 93a2be3beaffa9a6ba9e0929cc2f98cdc6babfa9deb62732d2a236ab67d30a9b
                          • Instruction ID: 36fbd0d9a46510490f71787e4c2eb21aef69474ab92a567b557cdea436e9bdcc
                          • Opcode Fuzzy Hash: 93a2be3beaffa9a6ba9e0929cc2f98cdc6babfa9deb62732d2a236ab67d30a9b
                          • Instruction Fuzzy Hash: D8510431B08304CFC724DBAAD84857EFBF6FF85220B045D6ED54AC7691EA70AC009B51
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 04c01da5089ddd910737094c6f0e81a4eb30c2a8c900f096c5498eb8b609517b
                          • Instruction ID: 8390d119da06e00a35f1acd10f3d060f1ed53b4faa07ca010c8faa4829b1b15d
                          • Opcode Fuzzy Hash: 04c01da5089ddd910737094c6f0e81a4eb30c2a8c900f096c5498eb8b609517b
                          • Instruction Fuzzy Hash: 42517334E14248DFCB14EFA5E458AADBB72FF85710F109D2AE80267294DF70AD85CB51
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e4a8c3abc737a6390fbc48e2d73dbdd96ea6e7800c5a6d7cf667b8bdee104f25
                          • Instruction ID: 44111079b72d9c5cf20aaee693d4dc5cd3a22e9722ca01e09d54b5260eeeba7d
                          • Opcode Fuzzy Hash: e4a8c3abc737a6390fbc48e2d73dbdd96ea6e7800c5a6d7cf667b8bdee104f25
                          • Instruction Fuzzy Hash: 8651E339A05218DFCB00DFA4C985AAEBBB2FF45310F5585E5D806AB327DB30AD41DB81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: faffd4c4feb7ae7b8315670c8a5480f7527be738261e9446dbef80e3fd292730
                          • Instruction ID: 5197036520eff6421b926bc3e6c01a5006f0fbfa49472b0ffb1016ae381c4cc5
                          • Opcode Fuzzy Hash: faffd4c4feb7ae7b8315670c8a5480f7527be738261e9446dbef80e3fd292730
                          • Instruction Fuzzy Hash: 4551CF31B14614CFC764DBAAD5446AEB7F2FB84728F006D6AD45B87A80DB30AE41CF41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: db881fcbdfe19158b4c167855be5214422deb6c96cb5f3470a2cff2385ae8dd0
                          • Instruction ID: 33e8fefc9363004fb1cd7b85967a3147d76ac67e4bb500b23eb0110c753ec9ec
                          • Opcode Fuzzy Hash: db881fcbdfe19158b4c167855be5214422deb6c96cb5f3470a2cff2385ae8dd0
                          • Instruction Fuzzy Hash: C8516234A14344CFCB05EFA5C8989ADBBB2FF85300F519A69D8062B295DF70ADC6CB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0624aedb5a6290cccb1310c4e65e5ebe3fc86ede8d594d5d1cb5937e9d0598b8
                          • Instruction ID: fa8cb6b6a7d7f33eb1bf56674527e744c03eb14de8a3d08ce5293b712925aa93
                          • Opcode Fuzzy Hash: 0624aedb5a6290cccb1310c4e65e5ebe3fc86ede8d594d5d1cb5937e9d0598b8
                          • Instruction Fuzzy Hash: 67516330A14248DFCB14EFA5E4589ADBB73FF85710F109E2AE80267294DF74AD85CB51
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d3017b4c04de9a09be54d03bdc23df9a06bd0784429be9d38318d1d47943f0da
                          • Instruction ID: a0b659084960d82729d80ad9b97124b7db905c0a104c8fb4e22f133a907a7fb7
                          • Opcode Fuzzy Hash: d3017b4c04de9a09be54d03bdc23df9a06bd0784429be9d38318d1d47943f0da
                          • Instruction Fuzzy Hash: CB515E34A14348CFCB04EBA5C8989ADBB72FF85310F515A59D8066B294DF70ADC6CB81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 36c73bc846aae2b4b51c4a22fdc67bd67dbd5e2b606694cfeac1f18d42154e26
                          • Instruction ID: eaff8e4de3ea7237a210b52cdbfb2d7693c544f4f15674dd0fec5d6c14b54956
                          • Opcode Fuzzy Hash: 36c73bc846aae2b4b51c4a22fdc67bd67dbd5e2b606694cfeac1f18d42154e26
                          • Instruction Fuzzy Hash: A7516234A14248DFCB14EFA5E858ABD7B73FF85710F109A29E80227294DFB4AD85DB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b80ae92a36f94348f3ed857a27ce9dabea0261f6d150e2af9e074bd8d73c7475
                          • Instruction ID: 91b37fb0996b52f7ab684127decde0c7d5bf07a18673c00fb5cce56cb598a2e1
                          • Opcode Fuzzy Hash: b80ae92a36f94348f3ed857a27ce9dabea0261f6d150e2af9e074bd8d73c7475
                          • Instruction Fuzzy Hash: 39518D34A09209CFCB04CF65D45BBBE7FB3EB84361F24802AE44A97243CB349941EB45
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dc5ac3b260658964ee2016cd0709cbc28248157992b05f5dc16ffbaa4c289487
                          • Instruction ID: bd743478ef94a5f7a61c941fdebf0e16dee7f461dddcbc908ebd79ea0da394b7
                          • Opcode Fuzzy Hash: dc5ac3b260658964ee2016cd0709cbc28248157992b05f5dc16ffbaa4c289487
                          • Instruction Fuzzy Hash: 72517430A18248DFCB14EFA5E458AADBB73FF85710F109E16E80267294DF74AD85CB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: da0ae2aacf5161a76c54a44a1e3c14c2456ea353f67ff4a2fa6a98357fb1894f
                          • Instruction ID: 2a594919027129c51e5b07e37ba2e88416a8c969f1c92168949efbbc59cdb5d0
                          • Opcode Fuzzy Hash: da0ae2aacf5161a76c54a44a1e3c14c2456ea353f67ff4a2fa6a98357fb1894f
                          • Instruction Fuzzy Hash: F5319E31A04205AFCF15DF54E848AAA7BB7EB88310F015028ED065B25ADB71EC51EB90
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ff845777d229bf46c028bf12fd1e7546005741291299cfebfe211d4d6d2000ff
                          • Instruction ID: a3fbaa026ca121550ce1bff2939218f93951cf051a0e82195c487fa8504a7ec2
                          • Opcode Fuzzy Hash: ff845777d229bf46c028bf12fd1e7546005741291299cfebfe211d4d6d2000ff
                          • Instruction Fuzzy Hash: 14414234E14248DFCB14EFA5E458AADBB72FF85710F109E29E80227294DF74AD85DB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c3334aa78b958da633aea029e8621a45c73f0d3aa3a08f00fc93eb15922cea3e
                          • Instruction ID: f12d9ae5bc75d78a59d529d296ed5a05c02d2e4e7e7b594afddc23aa44bec806
                          • Opcode Fuzzy Hash: c3334aa78b958da633aea029e8621a45c73f0d3aa3a08f00fc93eb15922cea3e
                          • Instruction Fuzzy Hash: 4B414D70D4431ACBDB55DFE6D4146AEBBB6FF85300F205D2AE402BB280DBB459858B91
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5f69ae2143dddce0ba0719042cd7a2436e083ed830a1cf55991157ef10dedc3c
                          • Instruction ID: 26e110f1b811b980de99b8311b8f64cece87cd97f1ad700974cba9bda486fe6c
                          • Opcode Fuzzy Hash: 5f69ae2143dddce0ba0719042cd7a2436e083ed830a1cf55991157ef10dedc3c
                          • Instruction Fuzzy Hash: 5E317330B24514CBDB19EA64E8585BDBB77FBC4721F80411AEC07A7240DFF4AA46DB92
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 37c6c413fc29b71a5c3963f1f084cddaed671e440b1f8d4a9a699daa8f2662ed
                          • Instruction ID: 4e0c4c16d0144b31049f881a939bb22f691dd76a0895307b06d6b85c0b6ddcfd
                          • Opcode Fuzzy Hash: 37c6c413fc29b71a5c3963f1f084cddaed671e440b1f8d4a9a699daa8f2662ed
                          • Instruction Fuzzy Hash: 7431BB35A18145EBDB14DEA8D844BAB7BB2FB44322F508026DD4AD7240DFB89D41EB91
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 25e2425ddb6e8ce282c41a02757434fd2db13b1917a9ba360c38be2d1b8c1117
                          • Instruction ID: d57df07978747e969e05a9aaa574eaec02b73e15eb8e221643083d15b203087d
                          • Opcode Fuzzy Hash: 25e2425ddb6e8ce282c41a02757434fd2db13b1917a9ba360c38be2d1b8c1117
                          • Instruction Fuzzy Hash: 50416434A14344CFCB04EFA5C8989ADBBB2FF85300F515959D4066B295EF70AA86CB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 404a6ae089ab5f5c2115a7d15b3c005b0a89afd9103e94d8cc5adb620d2ad73c
                          • Instruction ID: 563c1de09535ffb081cebdf06755b968a75da0ef55a14c6446efdbcfb3f9facc
                          • Opcode Fuzzy Hash: 404a6ae089ab5f5c2115a7d15b3c005b0a89afd9103e94d8cc5adb620d2ad73c
                          • Instruction Fuzzy Hash: 07416234A14348CFCB04EFA5C8989ADBB73FF85301F415A69D8062B294EF70A9C6DB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1df23532512e2d1f36a8b07d9dc2183a65d68094cacea661a2cea0cd8561c06c
                          • Instruction ID: 1470f1d6804b691c41011ab143feca1ef42373b4fc0471754b33bb04002c53ca
                          • Opcode Fuzzy Hash: 1df23532512e2d1f36a8b07d9dc2183a65d68094cacea661a2cea0cd8561c06c
                          • Instruction Fuzzy Hash: C24142B0D00249DFDB14DFA9C984ADEBFF6FF48310F108029E409AB215CB359949DB90
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 45cb615c4e6e5128999451a50d87ef2dcbe3de43c71a43b222fda8f4a8de5037
                          • Instruction ID: cb2d5e9d674d8d70f97f8af8f6bde62961539c48e623ba66cccb802d7e8258b4
                          • Opcode Fuzzy Hash: 45cb615c4e6e5128999451a50d87ef2dcbe3de43c71a43b222fda8f4a8de5037
                          • Instruction Fuzzy Hash: 6131AF71A041189BCF08DF94D899AFFB7B6FB48210F14442AEA02B7290DB759D41CBA0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4a06fa64a5c67296158cc3d0bed2e0bf544869a60084a6a94674bbe6c40ebe0d
                          • Instruction ID: 17e6813192eb07b25fe5faac1b589931e466fcb99533afb617e4350d4b3e45bb
                          • Opcode Fuzzy Hash: 4a06fa64a5c67296158cc3d0bed2e0bf544869a60084a6a94674bbe6c40ebe0d
                          • Instruction Fuzzy Hash: 6C415334A14744CFCB04EF65D898AADBB72FF85301F515A69D4062B294EF70ADC6CB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 198882a79afd55eb907c24c1606f5f13c9de38d036bad4ac9aa7bb8d813475fa
                          • Instruction ID: d80540ee1bbdd43bd8e6770bf26a9c33fda3616fbefe5c657935415a630f1559
                          • Opcode Fuzzy Hash: 198882a79afd55eb907c24c1606f5f13c9de38d036bad4ac9aa7bb8d813475fa
                          • Instruction Fuzzy Hash: AE315C72A00059AB8F068ED59C50CFFBFBEEB4D200F044066FA55E2180DA76DA259BB0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8c5a57c79f05d1e6c649b89561b85b04594d336816bff5c9829150b6cf2afda0
                          • Instruction ID: bda78f548e069f94fe4dbd104a02a26138ac6b3b50b9c4d666fe3fac5bd5e2e6
                          • Opcode Fuzzy Hash: 8c5a57c79f05d1e6c649b89561b85b04594d336816bff5c9829150b6cf2afda0
                          • Instruction Fuzzy Hash: 63413234A14708CFCB04EFA5C858AADBB73FF85311F515A69D8062B294EF70AD86DB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: aef84936106b9761cbbcb7a51c7695d41a70cbb7e24c5b8589e51dd1c4c5aed4
                          • Instruction ID: 0dc12ee09a3cf61f3979783db90f6e81c61ea8f29d03bdff3d9f30097f2f769c
                          • Opcode Fuzzy Hash: aef84936106b9761cbbcb7a51c7695d41a70cbb7e24c5b8589e51dd1c4c5aed4
                          • Instruction Fuzzy Hash: B3414234A14704CFCB04EFA5C8989ADBB73FF85310F515A69D8062B294EF70AAC6CB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ed4d20741126675ca68c8b39475d04148238e81d059b7a4f443b4f26e1a9d8cb
                          • Instruction ID: 0b92f29debcdd3af6bc7190af830d044da73ed8c1b7021cfba9d2e3c9f414d38
                          • Opcode Fuzzy Hash: ed4d20741126675ca68c8b39475d04148238e81d059b7a4f443b4f26e1a9d8cb
                          • Instruction Fuzzy Hash: A9318330604248CFDF15DF2AD448BAA3BA3FF84325F14852AEC0687250CBB5D986EB45
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a9aba5fd45c29800691c63cefd7259f076ea0cce5bdafeaa5e671ad6f71e8855
                          • Instruction ID: 6f38de7162bb455046757447944c0daf3f96b93db378198e920242ea5bbb151a
                          • Opcode Fuzzy Hash: a9aba5fd45c29800691c63cefd7259f076ea0cce5bdafeaa5e671ad6f71e8855
                          • Instruction Fuzzy Hash: 26415334A14748CFDB04FFA5C8589ADBB72FF85311F405E69D8462B294EF70A985CB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ba84ecbf4e155a5edf721347ddca3bc848642385d44463093f5873a5e05b0e5a
                          • Instruction ID: 952f7f80089bc8e4029d6e8e67afb6b6780002e0215fb8dd3f82007422fe7402
                          • Opcode Fuzzy Hash: ba84ecbf4e155a5edf721347ddca3bc848642385d44463093f5873a5e05b0e5a
                          • Instruction Fuzzy Hash: 1C416434A14744CFCB05EFB5C8989ADBB72FF85300F515A59D8062B295EF70A986CB81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fb5c69d05eff13f7e4692bcf746faec2410914ddef5f6f69b03437d9e68624ae
                          • Instruction ID: 7b7739667cde5426dd435ce9c6f1489515f2789336ef3ef5e74175f7533211d3
                          • Opcode Fuzzy Hash: fb5c69d05eff13f7e4692bcf746faec2410914ddef5f6f69b03437d9e68624ae
                          • Instruction Fuzzy Hash: E741EEB0D00249DFDB14CF99C884A9EBFF5FF48310F208029E81AAB254DB75A945DB90
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d15330616ac3ebe454f8d3aea583a746e83c4b23fe921f39dce2064a9560800d
                          • Instruction ID: 1e2d8a4c820fa9e4e95263732f80d41a8f0113817184425bb1af77251c5d58d6
                          • Opcode Fuzzy Hash: d15330616ac3ebe454f8d3aea583a746e83c4b23fe921f39dce2064a9560800d
                          • Instruction Fuzzy Hash: AA318730F14A09CBCB05FBB9C8594BEF7B6AF85700F545616D506A7280EFB09A45C7D2
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 34d0ade6dd6e55dabbbba62be1a200c08a20ea3753ed5e4cd6fe248ffc8fd037
                          • Instruction ID: d1706679f070c35f1d98b2fd12d8775c802f38f1dcb40fc40862a6db8e49bff9
                          • Opcode Fuzzy Hash: 34d0ade6dd6e55dabbbba62be1a200c08a20ea3753ed5e4cd6fe248ffc8fd037
                          • Instruction Fuzzy Hash: 13317434A14348CFCB04EFA5C8589ADBB72FF85300F505A69D8462F294EF70AA86DB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3034ba8c70be997693611b242eab60328ef1e222e6807ca89c45b95ff489eb40
                          • Instruction ID: ef07d5ae0f47fb070cdafc7804574446d8504113b47910d6ab7866c80f92d396
                          • Opcode Fuzzy Hash: 3034ba8c70be997693611b242eab60328ef1e222e6807ca89c45b95ff489eb40
                          • Instruction Fuzzy Hash: D4314B30B04305DFD714DF68D89BB7A7AB6EB88320F108429D90BAB286DF759841EB54
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6049200894de86ce1fa24c7138e8b439cf988e50c7a2446df48d9447f769f52f
                          • Instruction ID: 4cda4480e69d665efd359e45f7caa530b070bf4c189586457a77cf3f39e2b3c2
                          • Opcode Fuzzy Hash: 6049200894de86ce1fa24c7138e8b439cf988e50c7a2446df48d9447f769f52f
                          • Instruction Fuzzy Hash: 7F310374A092449FC726CF64D8597AEBFB2FF46300F14809AD445DB351DB749D81DB81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b4f2640190a5d6162571c58b23f4d2367b0edd85296b1e40b01b6ad16f7dd584
                          • Instruction ID: c4b982689a16bff9cf891bbd3d62f6f52f6c0712ea6d0ed44237c98a3fae5efd
                          • Opcode Fuzzy Hash: b4f2640190a5d6162571c58b23f4d2367b0edd85296b1e40b01b6ad16f7dd584
                          • Instruction Fuzzy Hash: 7131DC34714204DBCB08EF28D45966E7AB3EB84365F508438E8078B6A5DFB4DD85EB54
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4c78b151194f4c71dab53bef4dd1eb6dd5db9f14c9295d20a7d71d2b7eaa3dfc
                          • Instruction ID: a1d78f03a5ca92d8419aeaaaf11390c59a05b9d16461d13fe1526794f597aa81
                          • Opcode Fuzzy Hash: 4c78b151194f4c71dab53bef4dd1eb6dd5db9f14c9295d20a7d71d2b7eaa3dfc
                          • Instruction Fuzzy Hash: 0D21D7323081109BD720CB69E484A6ABB9EFB84331B4585BBEE4EC3251CBF1F941D791
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 12f0f377b6a205905700226a1d76f37264b79ab5be160b40142deea319566988
                          • Instruction ID: 19ee43755d8038134db8e2eb25ecf621137415dedc993fe9807687d149cb7376
                          • Opcode Fuzzy Hash: 12f0f377b6a205905700226a1d76f37264b79ab5be160b40142deea319566988
                          • Instruction Fuzzy Hash: D6216F78B046059FDB14EFA9E8546BE7BF2FB8C641B140025E907D7384DF785D028BA5
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c907d5d7f1370dc69b40d66abdbfd71f3b3669730604b9d2f2cda273565d2d05
                          • Instruction ID: caa755b87f8a73be5dde01fa5ed3893fc0137629e2a27c920bb09da6a3dd60dd
                          • Opcode Fuzzy Hash: c907d5d7f1370dc69b40d66abdbfd71f3b3669730604b9d2f2cda273565d2d05
                          • Instruction Fuzzy Hash: D721B171E14608CFCB01FBB8C9595BDFBB2AF85710F44462BD906A7280EF705A45CB92
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8b59b1f7ebbbc50900c5460b1679e439a3718a2ed5507d77ba98ce86bf3d79fa
                          • Instruction ID: a276b3028b8f3ba8b1c3800de4a73d6deb923f17fc52013f64ce5f9e6c049789
                          • Opcode Fuzzy Hash: 8b59b1f7ebbbc50900c5460b1679e439a3718a2ed5507d77ba98ce86bf3d79fa
                          • Instruction Fuzzy Hash: F041FA74A01118CFCB24DF59C894AADB7B2FF89304F5085E6D90AAB355CB30AE82DF51
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 21e162664ac7b6a935b8cd6379fb481d1c81a91af026fb9a16e1c9bca3790b50
                          • Instruction ID: a8d0907e24840c2006b7f3f322448998480eb01f5a7b18aa525c22277f68ea80
                          • Opcode Fuzzy Hash: 21e162664ac7b6a935b8cd6379fb481d1c81a91af026fb9a16e1c9bca3790b50
                          • Instruction Fuzzy Hash: 8A313770A04209CFDB64DFB9D945AAEBBB1FB48310F208269D40597346DF34AD82DF50
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bbfa44e387db37e9b9728ab269b11564db29d8002e01f40827c7ebac88895122
                          • Instruction ID: 5022a509a96c032555e68982a234fa375ef77596c37579c71a22e8ce1b1ac9db
                          • Opcode Fuzzy Hash: bbfa44e387db37e9b9728ab269b11564db29d8002e01f40827c7ebac88895122
                          • Instruction Fuzzy Hash: F8219F30B142448BDB14EB66D8497BE7BB3BFC1620F145E2AD80787280EFB09946DB42
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 71e7e7b25fd32a54128064fd71b602af84c49a90809e40bce062f35801875c6a
                          • Instruction ID: 2f8db6a9ceef0b7d5139f8b168283ddee7f50dff3d539671eca51834f9a7f08e
                          • Opcode Fuzzy Hash: 71e7e7b25fd32a54128064fd71b602af84c49a90809e40bce062f35801875c6a
                          • Instruction Fuzzy Hash: EF212B7220C2489FD725DAA494437EABFAAEB517B0F9480E7E445C7253D732D941E360
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7e07dc07b9e0a04a6209c6bc7da694e5156dbcf94e6cac49a1c6323c3486ea6e
                          • Instruction ID: 9cf8ec12ad07e65420b603430228733aa9fd4231ad3f4af1263c35f8239740a8
                          • Opcode Fuzzy Hash: 7e07dc07b9e0a04a6209c6bc7da694e5156dbcf94e6cac49a1c6323c3486ea6e
                          • Instruction Fuzzy Hash: 0221D531B04205CB8F16DE69A84D9BE7B76FB81371314443AED07C7240EF718912E7A6
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0dec145d1db376e062b11bc6485c5c99fcc92729f12bb44db91a9e6a718f481b
                          • Instruction ID: 43905904997c35a90cb3697a7f3a09be16d7271280826f0f777f1be7213198b9
                          • Opcode Fuzzy Hash: 0dec145d1db376e062b11bc6485c5c99fcc92729f12bb44db91a9e6a718f481b
                          • Instruction Fuzzy Hash: 2421A070714244DFCB09DF38D8582AD7BB3AB81361F048869E8078B2A1DFB49D46EB90
                          Memory Dump Source
                          • Source File: 00000004.00000002.3473506021.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_124d000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a351c2e869f78a8daa24e688b3ef9e2564a8be20d0aa28043616e5b18e657159
                          • Instruction ID: 4ab0343ba6b95735df53bf8608ad470775f7cd0f783024dcf61443f939def59d
                          • Opcode Fuzzy Hash: a351c2e869f78a8daa24e688b3ef9e2564a8be20d0aa28043616e5b18e657159
                          • Instruction Fuzzy Hash: 4E214871514209DFDB1ADF88E9C0B26BF65FBA8324F20C56CDA090B256C776D405CBA1
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d1733c4e71d85f351fc3a99f51636780568daa7bb5da099d1d3aee095b14e090
                          • Instruction ID: 9a0591d638686370125edaeb75a77760fb5c7cd5881a34ec0e51ab45ea0cf025
                          • Opcode Fuzzy Hash: d1733c4e71d85f351fc3a99f51636780568daa7bb5da099d1d3aee095b14e090
                          • Instruction Fuzzy Hash: D9212972A08359EFCF05CBA4D8461ADBFB6EF89320F0440DAE945A7293DB305A44D795
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f6f8472018bd523e1fbc0f544008efc42d3412d97d4d029a7bb9fad1207f6543
                          • Instruction ID: 0324fb0eefe2f12655948c85e23ba6c3f31d944968ee1b0aa13db7a0ecf8345a
                          • Opcode Fuzzy Hash: f6f8472018bd523e1fbc0f544008efc42d3412d97d4d029a7bb9fad1207f6543
                          • Instruction Fuzzy Hash: 0F212175E00218DFCB19EFA5D5949AEBBF6FF48300F10556AE806A7394DBB06C42CB90
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5db657e511a395531d00a0841a2749d85d2ac50d93a55b5320b6a5a09c609553
                          • Instruction ID: ae68fcbe7c866a8f1e0c0f1e89803e858dc98bacd43a15d056783671d9f304fe
                          • Opcode Fuzzy Hash: 5db657e511a395531d00a0841a2749d85d2ac50d93a55b5320b6a5a09c609553
                          • Instruction Fuzzy Hash: A921A630E05205DFCB14DF99D488AAEB7B7BF44320F208069E91697665DBB0DD81EB90
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 50d72dd00c19cfa4a87391e0696d2429dff74d397348b6cbdc8adeb7c8466395
                          • Instruction ID: c2a63a9a4e8a2acdf308300af205af2f662846bf85addd25f149747ad00ca55d
                          • Opcode Fuzzy Hash: 50d72dd00c19cfa4a87391e0696d2429dff74d397348b6cbdc8adeb7c8466395
                          • Instruction Fuzzy Hash: E3313270A0420ACFDB68DFB9D4456ADBBB2FF48310F208269D4169B252DF349D82DF40
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fa218027c27a78c3afc1b7f530145302dc6cd9e4da2c5dd5ea648edabeafaefa
                          • Instruction ID: e46f7cb2e0ed5ad8cf50b70dad70c4f02bce0ecf9be51e7960e06b6005a46f8f
                          • Opcode Fuzzy Hash: fa218027c27a78c3afc1b7f530145302dc6cd9e4da2c5dd5ea648edabeafaefa
                          • Instruction Fuzzy Hash: 5A2101342047018BC716EB79D41AA6E77E7FFC5710B908A29E8024B346CF34AC81DB96
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 80c0b8a779fb438efb561ab8d6c66c8245bf3580acc2b6a9c99b34ee601473de
                          • Instruction ID: 14b8077a08cd470cde578aa71a228f7df3128ffe3279d385689a66be91955587
                          • Opcode Fuzzy Hash: 80c0b8a779fb438efb561ab8d6c66c8245bf3580acc2b6a9c99b34ee601473de
                          • Instruction Fuzzy Hash: 9821FF342047018BC716EB79D41AB6E77A7FF85711F948A39E8064B386CF74AC81CB96
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 02ff283654251b8da734638a8ada529e1fba2b92d15b5f86b385f200323340f3
                          • Instruction ID: 5598cc4f27617a7ad3dd18a1423bc10f5252217bd3ac02ff391686bbec937f11
                          • Opcode Fuzzy Hash: 02ff283654251b8da734638a8ada529e1fba2b92d15b5f86b385f200323340f3
                          • Instruction Fuzzy Hash: D6119674B143209FCB14CB3998067BE7BB6ABC9361F04452AF84BDA381DB318541E779
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b195f02e26695c833e36182660cd7c3abba178644981c98f8c2487fbc95dd622
                          • Instruction ID: ef326e358735727cc90b94f8416b948085dcf617322413d85e33bbb1d7fab9be
                          • Opcode Fuzzy Hash: b195f02e26695c833e36182660cd7c3abba178644981c98f8c2487fbc95dd622
                          • Instruction Fuzzy Hash: 92219275A14228EBCB158F59C44B5FEBFB7AB8C330F148119E516B3381DFB14901AB54
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f78e9773065175c792c500ba398595533a48ac44fa39a9ad841c009bd9d31f40
                          • Instruction ID: a8f598f4ff636287d2bbb63888820d29078c309ef5b96fe2224a9dd519411035
                          • Opcode Fuzzy Hash: f78e9773065175c792c500ba398595533a48ac44fa39a9ad841c009bd9d31f40
                          • Instruction Fuzzy Hash: 29211971A00209CFCB04DF55C545FDDB7B2BB48322F5046A9E806AB291DBB69D41DBA0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fcd21fbad04754f71440869bd62be9bf8806b6ea9f84f8b04674cb5c5904c0a9
                          • Instruction ID: 4a0ced83c06abde93612a6c71784cdf42d947ed55e21850e23e55237daaae7ad
                          • Opcode Fuzzy Hash: fcd21fbad04754f71440869bd62be9bf8806b6ea9f84f8b04674cb5c5904c0a9
                          • Instruction Fuzzy Hash: 8821C0B4A113118FCB18DF7DE44A3AEBFF2EB84711F048529E00AD7642DF345946A79A
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bfa18e5221c24d19c1af628a25b8047f38b4fa27acde2d1527cf2142d142c6cc
                          • Instruction ID: 7fec01acf8ce0ea94650dda26f0e7eda327f4effd0aab7ddac6f9da4ba26ed2a
                          • Opcode Fuzzy Hash: bfa18e5221c24d19c1af628a25b8047f38b4fa27acde2d1527cf2142d142c6cc
                          • Instruction Fuzzy Hash: 6C213D71E04219DFDF18CF95C844AEEBBB7FB84360F10853AE906A7260DBB09945DB91
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a938f291c746e961ef3fbdb3fdddbc081e107d18bb9f03eca7a0a4762f86407a
                          • Instruction ID: 4f8f3b4a96539277ea41a1b3ec23fa62ade68f57f583b3a36078cc5d3219444d
                          • Opcode Fuzzy Hash: a938f291c746e961ef3fbdb3fdddbc081e107d18bb9f03eca7a0a4762f86407a
                          • Instruction Fuzzy Hash: DB116335A24228DBCB198F59C4475FEBFB7AB8C770F148115E516A7395CFB14801AF60
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: da8dd027928bf3a556a828685aa9b6beff75bec6cf7c3da0683deb96d769244b
                          • Instruction ID: b8cc61022fe4e5c1554fc60fc3d4f9e8e0ffbb60ee4e67bbebe0a98e9e5f7e26
                          • Opcode Fuzzy Hash: da8dd027928bf3a556a828685aa9b6beff75bec6cf7c3da0683deb96d769244b
                          • Instruction Fuzzy Hash: 531160353542148B8B179AA9A41C87E3A67FBC86727118136FC078B354DF748842A796
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 13393c86210fd9615e63312eb36284907904cabf0e83f45f21ef99cc96b0e289
                          • Instruction ID: 27ca1b4cb46418bcc755edd60829e4650bb3d8a78a917c56d3a6063e7d4f495a
                          • Opcode Fuzzy Hash: 13393c86210fd9615e63312eb36284907904cabf0e83f45f21ef99cc96b0e289
                          • Instruction Fuzzy Hash: A81193787082408FCB29EB2A9498A3B77B7EBC9210B15592AE907877C1CE749C41D751
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b214b5bb99ee08b465e5508050b6b2cecd723a4bfc9f4a2cf8b32d91c9ca02e6
                          • Instruction ID: c0fc21cc039efc662882c2311c18c328fced16eb570e470216831fc13bc73d99
                          • Opcode Fuzzy Hash: b214b5bb99ee08b465e5508050b6b2cecd723a4bfc9f4a2cf8b32d91c9ca02e6
                          • Instruction Fuzzy Hash: 7211D330715205CBDB15EB61C41C7ADB777BF89204F10AA1AD403572D6DFB48E85DB82
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4d0c3666ecbe559311600b19ea1e380ffc75f9f35db2389f972b1ebe081f899d
                          • Instruction ID: 5212f7e7072044ef4dae8f5cb48fda45a6ff05ca4bbc3855b28c270a9c935058
                          • Opcode Fuzzy Hash: 4d0c3666ecbe559311600b19ea1e380ffc75f9f35db2389f972b1ebe081f899d
                          • Instruction Fuzzy Hash: E011D038B28214CBDB15EE16E45D77E7BA7BBC4610F10A81AE003872D4CFB44D82DB46
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a5bca0024e15fbcd066fdb860279c6f2e052739b477c9ebec46e8fd35bcacea3
                          • Instruction ID: 20d569d9dfedf06d2db3d8952b23be6f5be2bf22c8d09f89f0c4737410221da0
                          • Opcode Fuzzy Hash: a5bca0024e15fbcd066fdb860279c6f2e052739b477c9ebec46e8fd35bcacea3
                          • Instruction Fuzzy Hash: AA11FE75344344AFDB014F59EC4AFAB7BAEFB99730F104026FA45CB2D2CA7188109750
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 82d98fb1f05e14d31847802fd523b96af70b9c54bc2e8544d508073623b72e5c
                          • Instruction ID: f72fae2b0a46960d9c2eda9949711666fd19d088e03ccbece5415d571cca9cab
                          • Opcode Fuzzy Hash: 82d98fb1f05e14d31847802fd523b96af70b9c54bc2e8544d508073623b72e5c
                          • Instruction Fuzzy Hash: D5213B74A15219DFCB04CF54D486AADBBB2FF48311F148556E842AB366CB34AC86DF40
                          Memory Dump Source
                          • Source File: 00000004.00000002.3473506021.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_124d000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                          • Instruction ID: 78f7c54bdb519de3065595110006c5fbfd3c4a55d23a9cd37cbff75acf922565
                          • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                          • Instruction Fuzzy Hash: 9511E176404245CFDB16CF48E5C4B16BF71FB94324F24C1A9DA090B257C33AD45ACBA2
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b9a9afeab103735eddcfe485342c402c612f5205cc1c08077f5f8c4168fac631
                          • Instruction ID: ed5d5e0fc88d1433b2a0cc94c837eee073e656e4c33a8265ea66584f82f7f8ae
                          • Opcode Fuzzy Hash: b9a9afeab103735eddcfe485342c402c612f5205cc1c08077f5f8c4168fac631
                          • Instruction Fuzzy Hash: D81125B9B082808FCB29DB79948863B3BA3ABC9210F195D2AE907873C0DE745C42D301
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f0d72c511c1f0597f214273429d1ae76176bbd6745e488226e3d3a22b461f7de
                          • Instruction ID: b23b2657db346475339bad9dae5f7036d828d15b107ced0a909dbf1b127bfd59
                          • Opcode Fuzzy Hash: f0d72c511c1f0597f214273429d1ae76176bbd6745e488226e3d3a22b461f7de
                          • Instruction Fuzzy Hash: DE113038B18114CBDB19EA16D05D77E7AA7ABC4611F20AC1AE4038B6D4CFF48D42DB85
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2fff2450ce981ad5ddc54464a5cfac35786a88d2ab087f2e45c4fe12b21db23a
                          • Instruction ID: e21af95eb788a131501e3d699fe610c1c7c99d00b56c8bd7760f38c26339f1c0
                          • Opcode Fuzzy Hash: 2fff2450ce981ad5ddc54464a5cfac35786a88d2ab087f2e45c4fe12b21db23a
                          • Instruction Fuzzy Hash: 5E113C38B04209CFDB14CF54D58896DBBB7FB99305B558066ED1AAB361DB30EC40EB11
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 80fcd8e2cc02c6354929de3210a060572ac4215dfcb656c0c06c77061ce0ace8
                          • Instruction ID: e1bea2a8dbcc5bc9252a6baa5ce7ebdc7a1408885c8071312205f0a86154bf9e
                          • Opcode Fuzzy Hash: 80fcd8e2cc02c6354929de3210a060572ac4215dfcb656c0c06c77061ce0ace8
                          • Instruction Fuzzy Hash: 9D11A179308540CFD709AB25E56C92A7BB3EBC92113518029F80B877D5DFB4AD02DB94
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3211b0e2e8eb32292e62d7a7ec6263fd3951cfaadf2b77e9238afd148822da59
                          • Instruction ID: 26f0ff1d8f6dda719e2cedf8e92af250f8ae34efe96491fc13e7539c4b794d47
                          • Opcode Fuzzy Hash: 3211b0e2e8eb32292e62d7a7ec6263fd3951cfaadf2b77e9238afd148822da59
                          • Instruction Fuzzy Hash: B801F535B062059FC719CB69D455A9AFBB5FF8A320B1841A9E809A7362DB30AC00C7A5
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 641b666cda0c4d70ad77b43c33348534322320974c3d138314bd408b65a74614
                          • Instruction ID: 3d09b03abe4f9d517d1f3da5cc9d44977a2a42b59b8c50b77e4784b78a7f0040
                          • Opcode Fuzzy Hash: 641b666cda0c4d70ad77b43c33348534322320974c3d138314bd408b65a74614
                          • Instruction Fuzzy Hash: 9D211F78A11219DFC715DF65C894A99BBB2FF89304F1081EAE80AAB354CF359E81CF40
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ff642b4b70a333868a6103a82fc1a8634342f64ed98e8a99e9b9d1ad034d44a2
                          • Instruction ID: 9dcdb4df3893b1be0afba9578df2bcb532497773c497ef4b013d7fdfd2f2f378
                          • Opcode Fuzzy Hash: ff642b4b70a333868a6103a82fc1a8634342f64ed98e8a99e9b9d1ad034d44a2
                          • Instruction Fuzzy Hash: 03116BB25092409FCB12DB68DC59B597F71DF45332F16449AE04ACB2E3D5349C02C711
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ca82f75bcad13b3e5b0411bc7d7234a8b3529329e6ff17dfdc1e85a8e576bbf6
                          • Instruction ID: 143f1551e896aaf5096ba22dd686b0fc0cf331022433957db8c46d03a0335822
                          • Opcode Fuzzy Hash: ca82f75bcad13b3e5b0411bc7d7234a8b3529329e6ff17dfdc1e85a8e576bbf6
                          • Instruction Fuzzy Hash: 1C019EB9308500DF9709AB25E45C92FBBA7EBC96213618028F80B87794CFB5AD02D7D4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2278745f6eb5ae19cda6599001fa38f8c7f8488ee9eb3cf914032214abeb5b36
                          • Instruction ID: 74e81a23b35a4df4a61d5e0bebdb5761c139b6aa0c3644495bb165cbe479726f
                          • Opcode Fuzzy Hash: 2278745f6eb5ae19cda6599001fa38f8c7f8488ee9eb3cf914032214abeb5b36
                          • Instruction Fuzzy Hash: 0511CE38B1D254CBDB15AF21D45E27D3BB7AF81611F10581AE4038B2D5CFB84C42CB41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5ce6efb2fef5d07aa329eb74ff198dfc4c014da50425cbc51520fadfb509843e
                          • Instruction ID: 2a0d131fd33985df672d0f308a912283a86435282d2a0d000fb760abcf15d9c0
                          • Opcode Fuzzy Hash: 5ce6efb2fef5d07aa329eb74ff198dfc4c014da50425cbc51520fadfb509843e
                          • Instruction Fuzzy Hash: FD01F9723053057F4B151E9AAC84C7EBF6BFBD9270304813AFA1986241C9718814A760
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d9b37f122b790ecc94a1d956e309806a45db7de00c429ea506048f8ae4a4f81a
                          • Instruction ID: fff61ad438fc26c072ba3b70576ed575cc582db1c1d75616cb44f89579c52160
                          • Opcode Fuzzy Hash: d9b37f122b790ecc94a1d956e309806a45db7de00c429ea506048f8ae4a4f81a
                          • Instruction Fuzzy Hash: 0F0171B13043009FE7289AA59C49B3BB7BBFB84725F004A3DF61697280CBF1A8059790
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 618e5e76e880a0edda6fcac007f437b712e1a34e5f5bde193845cf7a56bc7ac9
                          • Instruction ID: d34d15b51dd5e846fd068ab30d19c378b69aa93a9662dd66a1737a2dd5f31784
                          • Opcode Fuzzy Hash: 618e5e76e880a0edda6fcac007f437b712e1a34e5f5bde193845cf7a56bc7ac9
                          • Instruction Fuzzy Hash: 0301F72271D2A48FC7018A75585A2AC7F209B52270B1846BFD9AE872C3DA14C505F359
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 13ccafb1d3f9b0744d3f22ef29ff502441a6df4d6e18fbf26ba31c7436e5aff3
                          • Instruction ID: 99f2d55ca57052d31deccf1c7f45a7314c85a1fc0c3c568594931c34b8134ce7
                          • Opcode Fuzzy Hash: 13ccafb1d3f9b0744d3f22ef29ff502441a6df4d6e18fbf26ba31c7436e5aff3
                          • Instruction Fuzzy Hash: C201B574A04118DFD758EFA9E5057AE3BAAFB44700F100525E106DB3C4CF749D418BD1
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b4ab9806d1e56ca0e8979490f4faf192b4c62055be2607428555d9e9a829c110
                          • Instruction ID: 593e874c386e5fa1e4518b3199d003a1ace72fb61c32be911b398ac1f8f44a07
                          • Opcode Fuzzy Hash: b4ab9806d1e56ca0e8979490f4faf192b4c62055be2607428555d9e9a829c110
                          • Instruction Fuzzy Hash: 7301DF35B066059FC718CB69D495A6EB7B5FB89320F188178E80AA7352CB31AC01C795
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ebe27426dca0756c851352a39bf05732ad321f31ae10a70f8e82488ca28006bd
                          • Instruction ID: bc1b855768c71490e86b9b3c4f141ffd3b2c64e270b4eee8fe2d7a89ba4e6de3
                          • Opcode Fuzzy Hash: ebe27426dca0756c851352a39bf05732ad321f31ae10a70f8e82488ca28006bd
                          • Instruction Fuzzy Hash: B8113074A1421ADFCB04DF54D496AADFBB2FF48311F148515E8426B351CB70AC86DF40
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 97a9743b0dab9039144ed772468676acefef7a3e2bc0c72d41c9085ef1842ac0
                          • Instruction ID: 9eb4c1ee0f41479fda1f5d3388fb22de9098da051d1c3d383b4bf249fc99eb22
                          • Opcode Fuzzy Hash: 97a9743b0dab9039144ed772468676acefef7a3e2bc0c72d41c9085ef1842ac0
                          • Instruction Fuzzy Hash: 75F02833708140CFCB19965AF8D89777BAAFBC9261B15097BF606CB291CE729C41C790
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 823494e60676955f34a3e4454eac59aba6ea5505473af85c12b8f2e4d3cb9173
                          • Instruction ID: e9521f788750fb532ca947f35fab51881f8d348a2f5b7797ce31546814f6e09b
                          • Opcode Fuzzy Hash: 823494e60676955f34a3e4454eac59aba6ea5505473af85c12b8f2e4d3cb9173
                          • Instruction Fuzzy Hash: 5B017C70E402288FCB19CF68C855ADABBF2AB4D390F1540AAD805E7392D7315D41DFA0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a0ded8c8a420a9d5bd41f297bf02caf9f11e7c61325a84df13231f7dbddaf224
                          • Instruction ID: b5bf2337ea56d3796adfa915d847361668639ce00de78121704473a850074b1c
                          • Opcode Fuzzy Hash: a0ded8c8a420a9d5bd41f297bf02caf9f11e7c61325a84df13231f7dbddaf224
                          • Instruction Fuzzy Hash: F0F0B4A17192141FE70C567B1C1A7BBAA9AEBD2660F55856FA108DB3A6CC648C0603A1
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cbce709f48cb5fb55f5b11488a5b9b1a44151446e86ba07649310e91c9b2c397
                          • Instruction ID: f620c5e5f6ace8e6f6817961262016b4fde1a4dd340d59aa14457fe2e541d22e
                          • Opcode Fuzzy Hash: cbce709f48cb5fb55f5b11488a5b9b1a44151446e86ba07649310e91c9b2c397
                          • Instruction Fuzzy Hash: 45F068713046099BDB10DE15E884D9ABBABEF80720B008E2AF9068B161DEF1EC499790
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1aae1e3a38e30a16b5a998c2cf34d9d301094b4a64f053a091ae603392ad46d9
                          • Instruction ID: 4c03c775b9af6db384825c0f60513fdbb1988692519c1b759a5bfe8c791f55d6
                          • Opcode Fuzzy Hash: 1aae1e3a38e30a16b5a998c2cf34d9d301094b4a64f053a091ae603392ad46d9
                          • Instruction Fuzzy Hash: 11F0CD3A3003009FD3049B15C848F7A37ABEBC8721F054529FA068B3A0CEB1EC428B90
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6d77639f5a3cd4c21c9dda48ca103ea0620aa5796e4335f88284967188474943
                          • Instruction ID: 8c21f9c8da8e94b4e699f67e986beef7a9f14a64ba0994eab8e0a3af0948d576
                          • Opcode Fuzzy Hash: 6d77639f5a3cd4c21c9dda48ca103ea0620aa5796e4335f88284967188474943
                          • Instruction Fuzzy Hash: 12F0F471205B008FC716D774C907B6C77E6EF85721F944E2AE0024B653DF74A841D752
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3efeb8ac61445f0f4b11254e0becb51c21c71da5aadcb19e04b81593c91811d6
                          • Instruction ID: bc851b9f13fbdddfc528372df993d8c5a9239d1f571caf735d2f7d9e9f0c27e3
                          • Opcode Fuzzy Hash: 3efeb8ac61445f0f4b11254e0becb51c21c71da5aadcb19e04b81593c91811d6
                          • Instruction Fuzzy Hash: 1EF050727092499FCB055F59B40547EBFA7EB853207098057F10A8B353D971C810A390
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7a8b66544066caa4692bc46d9bdae5daea58b12929b7afc7f2352753c47ffdbd
                          • Instruction ID: 434682b33534b7aca9f87c6a84f63ec6cc8c7f2c010ebad165e9deb885a96d3e
                          • Opcode Fuzzy Hash: 7a8b66544066caa4692bc46d9bdae5daea58b12929b7afc7f2352753c47ffdbd
                          • Instruction Fuzzy Hash: 44011A74A1421AEFCB04DF94D4969ADFBB2FF88310F148545E841AB355CB74AC86DB80
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9552306bb7c3f1d4ba0fd3be1c05d31cf9dddd30280b9e1a315568dcdb848b44
                          • Instruction ID: 77200bd9400fe0f33809a1002980f6d9259c171d30c48fb73e0cfecd6c5f2750
                          • Opcode Fuzzy Hash: 9552306bb7c3f1d4ba0fd3be1c05d31cf9dddd30280b9e1a315568dcdb848b44
                          • Instruction Fuzzy Hash: ECF0E5303493148BCB2876795C15B6632ABEB44651F001C79E90BCE2C0FEB2C8029F54
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4f5a9665a73d5125a79944c71b5b0538588294eb510d7370592df3159b6d1dbd
                          • Instruction ID: 2e435a2b33f431f75cbc92f654e7867fe2f056c81499869c67d244af7565c9f5
                          • Opcode Fuzzy Hash: 4f5a9665a73d5125a79944c71b5b0538588294eb510d7370592df3159b6d1dbd
                          • Instruction Fuzzy Hash: EA018F75908281CFCB11DB28C044959BFF2EF40704706CD95D8555B557CB34F806EB96
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fead39748463baa86dc09e714b827e6a55b9230e5ff10df3937aed3634d4c3e6
                          • Instruction ID: 9421e1a672fed6d277d6319af3a2eddfb045b0159404dabf79ecb3d53d000299
                          • Opcode Fuzzy Hash: fead39748463baa86dc09e714b827e6a55b9230e5ff10df3937aed3634d4c3e6
                          • Instruction Fuzzy Hash: 89F05E363003009FC715DB15D858E3B77ABEBC9721B154529FA069B3A0CEB1EC82DB91
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 44767d709fdf8b0f8e8efc08ed199c2b3ff4ef5dca4c886c3cb1fbad9e72c83c
                          • Instruction ID: c6e36b5bfba8d872031781888a392d4409ec1d1ecb56a8e0eb8ef7752242eb58
                          • Opcode Fuzzy Hash: 44767d709fdf8b0f8e8efc08ed199c2b3ff4ef5dca4c886c3cb1fbad9e72c83c
                          • Instruction Fuzzy Hash: 9FF06532759315D7D72466358C19B65326AEB05651F142C79D903CA2C0FBB1D4029F58
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 51508e7a566e513150d5e86045c1792d3edf1a85c174504612123a0a82a480c4
                          • Instruction ID: 890497bb5ceb58b1d5b1338e882270641a11de25ebd53399f1efbb41d05b92a1
                          • Opcode Fuzzy Hash: 51508e7a566e513150d5e86045c1792d3edf1a85c174504612123a0a82a480c4
                          • Instruction Fuzzy Hash: 36F06D38B18118CBEB18AF51E45E77E7AB3AB80611F605C19E003876D4CFF48D82DB81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f0475d622ce4f1aec26568f1013a1d901d06ec677820a7271bcbe4896d2c6347
                          • Instruction ID: 21756d5c7da4e75f693ceb66803bed17fb2975e681be0b2a4271e8c3c3ca8ecf
                          • Opcode Fuzzy Hash: f0475d622ce4f1aec26568f1013a1d901d06ec677820a7271bcbe4896d2c6347
                          • Instruction Fuzzy Hash: 25F05470618318EBCB19DBE5944A6AD7F7FBB88331F00C4ADF84692281DF744A41E785
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e75f82a11021f62947369b218ec382608ba820ab9baa001aa0a52fe2d94ad934
                          • Instruction ID: b913a1af434c3acaffae69080c8bfcdad0a884b7e1088921fe4a5a9b4a156965
                          • Opcode Fuzzy Hash: e75f82a11021f62947369b218ec382608ba820ab9baa001aa0a52fe2d94ad934
                          • Instruction Fuzzy Hash: 14F04FF1A196368BDB7A9FA1950663D3A23FB80B20F010105E8023B386CFB45E435BC1
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e45dfb8eccc8b64d1b5ec52947ee621c8f7e745b780723e9fd8642277543ac0e
                          • Instruction ID: d47a6a6687f30f468c537683246fec8922ae14bed3f8efde98bda006307e999b
                          • Opcode Fuzzy Hash: e45dfb8eccc8b64d1b5ec52947ee621c8f7e745b780723e9fd8642277543ac0e
                          • Instruction Fuzzy Hash: AE014F30B44215DBCB18DFA4C454A9D7773BF44364F204529DC029B3A4EBB2D882EB50
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f668513d6854135cd360fc1c2e6c6bd753b50521e055af3310e15bda2ec319f5
                          • Instruction ID: 2af4950cc713586e234522afddfd6fd7b2159f26e8382e52cc534574dd6e9d0a
                          • Opcode Fuzzy Hash: f668513d6854135cd360fc1c2e6c6bd753b50521e055af3310e15bda2ec319f5
                          • Instruction Fuzzy Hash: DEF09A75A41299CBDB04DE90C86E6EEBFB3AF88311F514429D401B7340DBB51D08DAB0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d10d2d148744908a3db3c6ffce6afc5470f8c7fe74f5d74ea674f3ed5b1e70fe
                          • Instruction ID: b2e6ab1ad4cd0b48d3596248f9ed18d9866ed191b94275a5d7471c4a08e7673f
                          • Opcode Fuzzy Hash: d10d2d148744908a3db3c6ffce6afc5470f8c7fe74f5d74ea674f3ed5b1e70fe
                          • Instruction Fuzzy Hash: C6011A38A19229DFDB25DF25C894AAA7BB2FF89204F1441D9D40D97395DB386D81CF40
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2634dab2a5b8a758fb2b510cd0780f5cc19a0ee2d10d2960b229546f3c43ead0
                          • Instruction ID: 47448a41ff0ed8e10cd7e0cc74276c43881c1572bd71d2db24eb3d7b5d8da42a
                          • Opcode Fuzzy Hash: 2634dab2a5b8a758fb2b510cd0780f5cc19a0ee2d10d2960b229546f3c43ead0
                          • Instruction Fuzzy Hash: 7F016D74A44129DFEB10CBA0D88ABEA7B76FB09300F508495E44A6B145CB31AE82DF40
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8fd83225cc8485724cbc3f6e7ddaca9f5754680814f53b781095642110b27495
                          • Instruction ID: c6ae43fab51ee3f821301a7bf17f8d42deff5f06292ba656b37748e2a794308b
                          • Opcode Fuzzy Hash: 8fd83225cc8485724cbc3f6e7ddaca9f5754680814f53b781095642110b27495
                          • Instruction Fuzzy Hash: 6BF04F30608244DFCB05CF69D458BEE7BB3FB45321F448569E40287251DFB49E99EB84
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: efbf971e4ebc9f2217592523a838c81847e49fe6aa880e79af8355f0633daef2
                          • Instruction ID: 541c0aacba94b5cef70b0e4d625a29c258a08b804d4244c2386e444caaf5353b
                          • Opcode Fuzzy Hash: efbf971e4ebc9f2217592523a838c81847e49fe6aa880e79af8355f0633daef2
                          • Instruction Fuzzy Hash: 20F0E2716247010FC26AEBBDE8544BE3B77EFD12103448F2AD0598F2A1CF74A98997A0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6ebeb0ba1fedaa9819ca44847ebf4be76b48ade18ec7c1531848a27d4d505edd
                          • Instruction ID: 80fd37c51e03113f15da9a8c6f4b8527f35349526cd1e81a5a94801fb2d9a074
                          • Opcode Fuzzy Hash: 6ebeb0ba1fedaa9819ca44847ebf4be76b48ade18ec7c1531848a27d4d505edd
                          • Instruction Fuzzy Hash: 0EF03C30D10708CFCB05EFB8C8548ADBBB1FF86300F41866AD4456B154EB309985DB52
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 85a97820ae3b135fbef526f8653a8b0af0fb7cc63bf7deb4fab7cb30104b904e
                          • Instruction ID: 6a33e8497b38cc1cd59439d4e8a891c57634e5f293a34c0db51021868835f47b
                          • Opcode Fuzzy Hash: 85a97820ae3b135fbef526f8653a8b0af0fb7cc63bf7deb4fab7cb30104b904e
                          • Instruction Fuzzy Hash: FAE0DF7130022827E30C666F1C15B7BB98EEBC5660F64803EA20DCB39ACC61CC4203E0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d4980499c7d8505f104d43baad384ede644cdb9472348d3a0b8044add2514e60
                          • Instruction ID: db4f439ae80e2e6ce8b55ad0d196256e38e685da42ea2dff8471158adbc6718a
                          • Opcode Fuzzy Hash: d4980499c7d8505f104d43baad384ede644cdb9472348d3a0b8044add2514e60
                          • Instruction Fuzzy Hash: 16E0E5B310C2049FC305D688DC07B16BB6ADB60B20F448065B9099B383DA22EC11E2A9
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0910e10be37fe9a1e3a64b9fe7366b652fd8edcbf653714e5cdd704a81f9b359
                          • Instruction ID: ac3b847ed233f3f100b971b38757b6d685b40ebf03f116f98476dd4b9f3478ce
                          • Opcode Fuzzy Hash: 0910e10be37fe9a1e3a64b9fe7366b652fd8edcbf653714e5cdd704a81f9b359
                          • Instruction Fuzzy Hash: A9E0DF336083486FCB021A89BC14C9E3F7ADBEA2317099563F50482222CA318822A7A5
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 40d6fd13b5371d5b91f4f8d0944c8986db4cdc022c11359b1646e44f34a6180b
                          • Instruction ID: 95536498ef8e4d8e647e1e0d6ee183a3c7d74d4143e0f77be4d8d1347e61f29d
                          • Opcode Fuzzy Hash: 40d6fd13b5371d5b91f4f8d0944c8986db4cdc022c11359b1646e44f34a6180b
                          • Instruction Fuzzy Hash: 60F02034D1A244EFCB01EBB8E8042BC3BF2EF79301B200A8BE445CB352D9340E00AB12
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 226403367d15ee3d5cc4882ac038a61e16a96051a903ea52a829fce0285673b5
                          • Instruction ID: 2453519fba606c9ffe65b6f2b387284d589e0e3c98b4a23709a36e523aee3b44
                          • Opcode Fuzzy Hash: 226403367d15ee3d5cc4882ac038a61e16a96051a903ea52a829fce0285673b5
                          • Instruction Fuzzy Hash: 97E09B7160060587C711DA2AE88485FFB9EEFD0360754C93BF10B47211CEF1BC4586A4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 85e153863bd9fa65e921126ce2368ba9452a3058b2bc04cd0337489c8b5c183a
                          • Instruction ID: 0b36865710059f377252fedc6667061828f4fd653921e980f7ea719247987fa9
                          • Opcode Fuzzy Hash: 85e153863bd9fa65e921126ce2368ba9452a3058b2bc04cd0337489c8b5c183a
                          • Instruction Fuzzy Hash: D8E0E5306107020BC629FB7EE8948BF376AEFD02207808F2DD0190B190CFB0A84997E0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3ba8e42551078e4a918c9300a666f67b83e23c7bdc4d0c5f7317bccd0aac7194
                          • Instruction ID: 406783fa29a4a6a52f431d65a00e98846359080f533d949d10357acc2b9cdf1d
                          • Opcode Fuzzy Hash: 3ba8e42551078e4a918c9300a666f67b83e23c7bdc4d0c5f7317bccd0aac7194
                          • Instruction Fuzzy Hash: C9F0A035A18124CFCB04CFA4D44AAFEB7B1FB48320F014026E91BD7242CB74E945DB95
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f2ae3f7680ecc319476b5637a93f03b54ed3ca62195c5463242cce837a46d807
                          • Instruction ID: c9c939bf6956fa83e7017edd4cbee5677df2667d2684718c7f3933a5b237cea8
                          • Opcode Fuzzy Hash: f2ae3f7680ecc319476b5637a93f03b54ed3ca62195c5463242cce837a46d807
                          • Instruction Fuzzy Hash: F6F0F438A04218DFDB20CF94C842BADBBB2FF49320F554099E5066B392D371AD81DF12
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: db992f2f835a819ec1d121472784f34cc81229e325df7d7def8c7eff03d4e9e6
                          • Instruction ID: eed22ca5126ee118e891ff272784ebf354446937f955a6e7d11b84fb436b8ece
                          • Opcode Fuzzy Hash: db992f2f835a819ec1d121472784f34cc81229e325df7d7def8c7eff03d4e9e6
                          • Instruction Fuzzy Hash: 54F090B8909129CFCB15CF24C898965BB71FF4A308F1440D9D80EAB299CB785E81DF50
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9d164733279f327c2c5e667c101ea4d7be948005923c3ef3193f1f893a0244a1
                          • Instruction ID: 3804b59250cf02723fda8a16f01ac32300060db48c5fb1f23775a8568c44ab51
                          • Opcode Fuzzy Hash: 9d164733279f327c2c5e667c101ea4d7be948005923c3ef3193f1f893a0244a1
                          • Instruction Fuzzy Hash: B7F06275A0126CCFCB64DF68D884699BBB1FB89315F2081EAD909A7744DB34AE818F41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c490757863002005dd5dc9e5a6eb8a2472cad6bcf74c990813b7d581ff136f27
                          • Instruction ID: 7f6b03a4668be83bf970f2a91005292742e82efd9fd3d753067d88ccfd3eb2f2
                          • Opcode Fuzzy Hash: c490757863002005dd5dc9e5a6eb8a2472cad6bcf74c990813b7d581ff136f27
                          • Instruction Fuzzy Hash: E2E020313493405FCF3105651C057A03779EB13B32F1A04A6F94CCF2C2D591D841D795
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 55c37dd60ddfef5728cdfb44f2f829c9d66e604877d62221950e241ff2e62e1c
                          • Instruction ID: 725deca58fdefdea2330432a2428f8c755a7f2f264d1e5f2715178d6f5685b2c
                          • Opcode Fuzzy Hash: 55c37dd60ddfef5728cdfb44f2f829c9d66e604877d62221950e241ff2e62e1c
                          • Instruction Fuzzy Hash: 02F03A30A44129EFDF10CBA0DC4AFE97B3AEB48310F4081D1E44A66255CB316E81DF40
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7cd94fb8cf510e8c04e6a7d480f09d2f26ad715ef9a014fdfac31bcaa1d93c94
                          • Instruction ID: 75611aaad20a8b8b57963e27fa20e2ba9bbb22f7d2fa439ab8da005193e4eae1
                          • Opcode Fuzzy Hash: 7cd94fb8cf510e8c04e6a7d480f09d2f26ad715ef9a014fdfac31bcaa1d93c94
                          • Instruction Fuzzy Hash: 89E0D831718514BBCB104904E404D7A3F5FBBC5331F80806BFC0A83204CBF1C941A395
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 14902282b139b9afc938988aa4e7ab2eeef893f7012366347bfaaaf8eb22602d
                          • Instruction ID: 85b09158cbfe3d4794d9840956cc05a9fede68d77d7457d118c41881bcc2aea8
                          • Opcode Fuzzy Hash: 14902282b139b9afc938988aa4e7ab2eeef893f7012366347bfaaaf8eb22602d
                          • Instruction Fuzzy Hash: 00D0123631411467E714669EBC85967BFEDE7D9561B50013AF609D3300DDE5AC0587A0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9d726de6aa5eef9103967d21078c072d724867bac2d139342428bd9c4a448ed6
                          • Instruction ID: 9ed17366b0ad8b1e7aecf81544f38b1be310c5ff715c569b625ba6d871bb489e
                          • Opcode Fuzzy Hash: 9d726de6aa5eef9103967d21078c072d724867bac2d139342428bd9c4a448ed6
                          • Instruction Fuzzy Hash: B9E086F3854A045BC350ABE0EA52BB9B741DB71362F07A822DA144B2D3E1228E53D610
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 43b670a4a6918780dade0e5eb8e3b0b25f4340287a8ecd69f8f6b0e86f94a6d0
                          • Instruction ID: 65ca736fb8fb43773dd9da62ac05d96481dc6b48ad55d0fd2285b4d4de6953c1
                          • Opcode Fuzzy Hash: 43b670a4a6918780dade0e5eb8e3b0b25f4340287a8ecd69f8f6b0e86f94a6d0
                          • Instruction Fuzzy Hash: F0E09230916219EBCB40EBB9D5452AD77F6EF78311B20495AE40587302DD745E406747
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 10b0a6d2ff429e658812d27de1c050e9917f9f29f8d684c868d552345096ad46
                          • Instruction ID: 23d38f88124755876318c7b3cbd9ff87347032c049b3581f02110ce8194359aa
                          • Opcode Fuzzy Hash: 10b0a6d2ff429e658812d27de1c050e9917f9f29f8d684c868d552345096ad46
                          • Instruction Fuzzy Hash: 62E0E570E00218EBCB19DBA5D81499EBBB6EF89350B10442AE916AB350DEB16D01EB90
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 042cd24bc1cb7816bad8f681cb7da50d393fed5d845ffd5a019299d19fded8b9
                          • Instruction ID: 51c5a16f5d587791540b48957d76a48f166cb967b7a3decabf1f7361a9e0cb6f
                          • Opcode Fuzzy Hash: 042cd24bc1cb7816bad8f681cb7da50d393fed5d845ffd5a019299d19fded8b9
                          • Instruction Fuzzy Hash: 4EE0CD317443045BCF3555694C05B6532BDEB46B32F504479FE0D9F281DEB1E842D7A5
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dfd218025c1507d7c9cbc9c6df815c7afc45de6ca79f2958e0f1d9de329053e2
                          • Instruction ID: 10807e561f575750c85625511563ce092e757c7ec711c518bf1699576591f652
                          • Opcode Fuzzy Hash: dfd218025c1507d7c9cbc9c6df815c7afc45de6ca79f2958e0f1d9de329053e2
                          • Instruction Fuzzy Hash: 7AE0923620D2849FD706DB74A82504DBFB1AF96210324859BE841CB252CB7A991ADBA2
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 45665bb628c647f7c61bd870bdf6fa16a71a054b76a4e199405370f8dcd91df6
                          • Instruction ID: f9176fc282ea24a3185d2174871bd80c5fa29f21b86c4d3536abe2b0d5d9daca
                          • Opcode Fuzzy Hash: 45665bb628c647f7c61bd870bdf6fa16a71a054b76a4e199405370f8dcd91df6
                          • Instruction Fuzzy Hash: 9CE09AA681D3809FC70327B8AD256847F705B23242F4E40EB9894CA6E3E1244929EB52
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 67a25779fcf0b609b4b93a28d9389bcae959fb68f5cca2bcc43d80d6c9b99829
                          • Instruction ID: 06cbd8a898e92a541958fcf007ab9a5af1ae64302bcbc2bdf88398fee4e332b8
                          • Opcode Fuzzy Hash: 67a25779fcf0b609b4b93a28d9389bcae959fb68f5cca2bcc43d80d6c9b99829
                          • Instruction Fuzzy Hash: 35E012F1E456358BDB399B658606B393A63FB40B60F414505E8013B246DB745E435F92
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f834e5905958955f3918fc036798f7d0bdef72ae54d0a4776aed7fce422c86ba
                          • Instruction ID: 1b946ae2b7b5157ef9b011a9f55bba3146604d53aeebc132e3285685f8cda842
                          • Opcode Fuzzy Hash: f834e5905958955f3918fc036798f7d0bdef72ae54d0a4776aed7fce422c86ba
                          • Instruction Fuzzy Hash: 50D0A732316024778214659DF804A6BB7EED7DAA76B40403BF60EC3340DE50AC0483F4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 31c794d4ce5ba52faf449846ea772d03ab6e2666dbe22aee089f5c7da1ee22f6
                          • Instruction ID: fa5e2c025b545f75a12bbc570471c4d4bcfe9149fc89febaffdfb02ca3d1970c
                          • Opcode Fuzzy Hash: 31c794d4ce5ba52faf449846ea772d03ab6e2666dbe22aee089f5c7da1ee22f6
                          • Instruction Fuzzy Hash: 41D0A732311024778204619DF80496BB7DED7C9A61740403AF60DC3340CE50AC0443F0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ac54b0533428df48623529e77630442e9d3732638e2e7de5a5e9fc1f0e85178f
                          • Instruction ID: 927a0d5907fcee8545b0ff07b8489573f9d97bc39cfa9671bceca82e92b5ecf7
                          • Opcode Fuzzy Hash: ac54b0533428df48623529e77630442e9d3732638e2e7de5a5e9fc1f0e85178f
                          • Instruction Fuzzy Hash: D1D012767482158B5B10C989D8824BDB726EA80731F104076DB4A52402D7305928B5A5
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7116087ff396630ef3e979afe16a00bfc10a2625c88b6bfc756571758777f667
                          • Instruction ID: 4b93a9cda6dab88eaa6f472724b1f879cc3883612e2b38171d360274a96e3b0b
                          • Opcode Fuzzy Hash: 7116087ff396630ef3e979afe16a00bfc10a2625c88b6bfc756571758777f667
                          • Instruction Fuzzy Hash: CBE0C7726092846FC301CED8C851962BFB4AF9A12030AC08BE898CB393CA359D02C7A0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e882602ab9c4a47062c666119c2130798a0812ee31b268dd233c7dbdb0a8ea67
                          • Instruction ID: ac01a420acc980f33e4325b1bf7f89c1cc06df46bdd123553ba3e990d7fc643f
                          • Opcode Fuzzy Hash: e882602ab9c4a47062c666119c2130798a0812ee31b268dd233c7dbdb0a8ea67
                          • Instruction Fuzzy Hash: 48D0133315D2444FC746D3945C55C5177FCD693158349D0D6D84DCB353D611DD01C1B5
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d74f3018aae4499213d0ee5527285e3d61de2b4cce2ffe1a50d19f26d7e508c0
                          • Instruction ID: 546b9faa8ad43db4e0ef2c58c97bbaab22bf1d4f47a25fb9a4a023189ac2edfa
                          • Opcode Fuzzy Hash: d74f3018aae4499213d0ee5527285e3d61de2b4cce2ffe1a50d19f26d7e508c0
                          • Instruction Fuzzy Hash: 11E04F73500008AFDF01CE84D941DA67B62FB84264F19845AFD085B211D772A931DB90
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9c3cd687aa535021de70cb4278c92045115e36b8c47bd6d7be2fa328f65a259e
                          • Instruction ID: d9f10d443ab96339cd08476837ed76613dd5becb68c6857d6701df4464d7c4d6
                          • Opcode Fuzzy Hash: 9c3cd687aa535021de70cb4278c92045115e36b8c47bd6d7be2fa328f65a259e
                          • Instruction Fuzzy Hash: 6BD05B3760011CB78F051E4AFC04C9E7F5ADBD86217048416F91442110CA71C921B798
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8be483c5e4a09ce129d16af6e9eb9d34739d48c0136325dab4995b1ed915c5bf
                          • Instruction ID: b216cdc719722fde192103781ad43837803b1e8ddd3e24e3906f120e813bc609
                          • Opcode Fuzzy Hash: 8be483c5e4a09ce129d16af6e9eb9d34739d48c0136325dab4995b1ed915c5bf
                          • Instruction Fuzzy Hash: 27E01276C02108EFCB10EFA5CD0668D77F9EF56206F9045E59504DB211EA31CA51DB81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6b08d20ce4e59b62eca8c78e2b8c4b4c72576e4a889867730f4527af8308375f
                          • Instruction ID: c809981d581b4fe34ae0000e4e6da1fd05738f7943eff81a36fee4a435d5d323
                          • Opcode Fuzzy Hash: 6b08d20ce4e59b62eca8c78e2b8c4b4c72576e4a889867730f4527af8308375f
                          • Instruction Fuzzy Hash: 6FD0A7B071042087CB05F72D881C33FE1EF9BC8500B104429E007D33C8DEB49C025B49
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                          • Instruction ID: d8e6f52d84d0e9a7535ad6c92223e7db018a165c074aefbb2bfd7201b7f166f6
                          • Opcode Fuzzy Hash: 8ab869af69afa5e3705abfa003fbeb05737d94153e11a484e1e7a4c73e3e153c
                          • Instruction Fuzzy Hash: D3D05E322001187F8B00CE88DC00CA67BADEB89220B04C05AFD5887241CAB2ED22DBA0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1db10de23b2ceb4f00997aa874a97cdf82ace655c17d6b0defef073ca536a64a
                          • Instruction ID: f33d779367e39041404332459ba3a44c970f5e76fa6693d8866b9fa45abb61c5
                          • Opcode Fuzzy Hash: 1db10de23b2ceb4f00997aa874a97cdf82ace655c17d6b0defef073ca536a64a
                          • Instruction Fuzzy Hash: 13D0A931304A164B8B26926EB80086B77DEDB886203008A36F80DC3301EEA0EC0207C4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 45935a6e3284cab6890b4e8c2671e2d619b286f386e38f7ad9e113645859f2b6
                          • Instruction ID: d456922f54baa136b509e1b4dfb016106cd6e4b06648191615c971c8cb67d13a
                          • Opcode Fuzzy Hash: 45935a6e3284cab6890b4e8c2671e2d619b286f386e38f7ad9e113645859f2b6
                          • Instruction Fuzzy Hash: 67E0C270C0D24ADFC342CE609B070A97F72AE813017188AEACC09E7100E7312A15E250
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 646264a3ceab0f9612250b8ea6f2a905c9ad97bed3f3ae5b7869814b263683db
                          • Instruction ID: bd2254a9ae6903813d68afa9a71007169dfb1aa0702fc65feb645f06c26838f0
                          • Opcode Fuzzy Hash: 646264a3ceab0f9612250b8ea6f2a905c9ad97bed3f3ae5b7869814b263683db
                          • Instruction Fuzzy Hash: 7DD0A7FBA000005BE344CD80D942BF5B721DB94661F15C05FEC088B340E972DD178780
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4c9693fe681f89214ac56a483b3c5aeb57053dfcf529b027a7e0bf254556f99f
                          • Instruction ID: 845ea5dc69333d52f6be78eb697cda7c74d161f75d18d8e647ae9418fdd5b619
                          • Opcode Fuzzy Hash: 4c9693fe681f89214ac56a483b3c5aeb57053dfcf529b027a7e0bf254556f99f
                          • Instruction Fuzzy Hash: 16D0A776A0E3854FD3029B75C809A493BB49F57A54F8504D2E485CB233F211DC05C6A1
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0c5a384f5e6e81e1826ec2ef3cbbe66f75e4318141d154556c75520425fa420a
                          • Instruction ID: 523ff944f3bc8e0c323bf4fff2a7b588c38daa756bf30284db7e0d543385f0d9
                          • Opcode Fuzzy Hash: 0c5a384f5e6e81e1826ec2ef3cbbe66f75e4318141d154556c75520425fa420a
                          • Instruction Fuzzy Hash: DED05E313041085FC704CE48C881E65B7A99B99264B1480BAED089F343DA21FC028B64
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cc5f706e286d26f1d70af929598ec4c2adf8529b620fede2dcd9b06995665f47
                          • Instruction ID: 797bd753a0fb48c9a2a5632f9d5a50630163e26bad3445df7a0f5357958124c6
                          • Opcode Fuzzy Hash: cc5f706e286d26f1d70af929598ec4c2adf8529b620fede2dcd9b06995665f47
                          • Instruction Fuzzy Hash: 2DD0237E5052069CC650C5C5BF45F613B4DF740235F04406BCE0445103C3242043A511
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f127330bbd7dcb4a94caa39b3977420ca3aefa2f195fee1d127319950e3a6c7b
                          • Instruction ID: 2a71ce0cacb8f8242eb548a6d97e61eb942052db00748869d6bcd137f4928cdf
                          • Opcode Fuzzy Hash: f127330bbd7dcb4a94caa39b3977420ca3aefa2f195fee1d127319950e3a6c7b
                          • Instruction Fuzzy Hash: FAD09E76906208AB8B41EFE5950945E77EDDB4520079045A6D504A7211E9315A10AB91
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0cc67c24c46803eb6ab090f577ad664591452437d0779ef2878af7f24438643e
                          • Instruction ID: e21a223459b9067e1b4174c1b2315d3c1cad5f0a1aa380ff93abb83785fbbabb
                          • Opcode Fuzzy Hash: 0cc67c24c46803eb6ab090f577ad664591452437d0779ef2878af7f24438643e
                          • Instruction Fuzzy Hash: AFD0C93010C3C88FC30687A49811D11BFE99E4715830FC1EEE58DCB2A3C632E912C796
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 581ef8ba262358cfc77cfc772ec1ebd1394b91e75dc56b9692e28c90da1fa459
                          • Instruction ID: 128cb1d68c814943e0be5534ae708e21617568b7695a70ed151efbef3676c899
                          • Opcode Fuzzy Hash: 581ef8ba262358cfc77cfc772ec1ebd1394b91e75dc56b9692e28c90da1fa459
                          • Instruction Fuzzy Hash: B5D0C9362041286B8244DA89D851CA6BBADDB89560714C05BB958C7341D9B2ED0287E0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 59a7f543c357e158e6518ef9cacc9eb440719fc3a40276a5c4d00c5a42825697
                          • Instruction ID: 2fbcf4fe10300b513a307fb661fd24a7e82f0491e6ca9fc8216731705ef9027d
                          • Opcode Fuzzy Hash: 59a7f543c357e158e6518ef9cacc9eb440719fc3a40276a5c4d00c5a42825697
                          • Instruction Fuzzy Hash: B8D022B13408188B8304A2BCF4080AA7BDAEFC82107804164E10EC3314DFB25C03C3C0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5154060367e1e77e6aaef2e21770d676c62170a8002d02d5b01fc77728680567
                          • Instruction ID: 899d39857fb517c4e4d95e6c310f0d47d02171c9703ec2cccb386cb079eeb7c6
                          • Opcode Fuzzy Hash: 5154060367e1e77e6aaef2e21770d676c62170a8002d02d5b01fc77728680567
                          • Instruction Fuzzy Hash: 0CD05E76C02208AFCB00EFE0880448E7BF9EB4620179005A69504D7210EA318A109B81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a893d2f4b9dd914a16b788df8503cb40cd1eca43f45fea3c5f79dc4d28531e68
                          • Instruction ID: 72b205ff6cdbf6be0bbd98c8decf8fe956dd44fc9425b4598f9736793cdd49cd
                          • Opcode Fuzzy Hash: a893d2f4b9dd914a16b788df8503cb40cd1eca43f45fea3c5f79dc4d28531e68
                          • Instruction Fuzzy Hash: 9ED0A730D1D30EEB8700CE55C90209DBBBBEB40340710CAA4D80A93100E7311A00E660
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0da17460eeb549022f574cd3ee14fe28594c67fc60e6b9f87a49f94f43edca5e
                          • Instruction ID: 5ebfdd5048fe09d0dd7f505f87288d1f5a0cdf83019210a3e18c6682c8d8c7c0
                          • Opcode Fuzzy Hash: 0da17460eeb549022f574cd3ee14fe28594c67fc60e6b9f87a49f94f43edca5e
                          • Instruction Fuzzy Hash: 7CD0A97B1100048FE3008B15D80CB6133B6AB10720F854058E0099B331C272E8508660
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0b476dc9fc3f697ac181155d6f9d98fe1d0e728bda10e3f1de2026883d710f41
                          • Instruction ID: 399b19409b12bfee8db974d66aa2a96c1138129ff0f8d3e3c5f1b8eb92e7f6bb
                          • Opcode Fuzzy Hash: 0b476dc9fc3f697ac181155d6f9d98fe1d0e728bda10e3f1de2026883d710f41
                          • Instruction Fuzzy Hash: A2D012352001187F9704DA88D841CA6F76DEBC9670714C05BFC0887301CAB3ED12C7D0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 473f2440007c55561e67249e6cd6fc9040ee1ce1f12731ae1a62ab4f8eee70a0
                          • Instruction ID: 431e7ab672b2a8611aab3bddaa90926d3783881a3d08f7f6b63b360b0f959298
                          • Opcode Fuzzy Hash: 473f2440007c55561e67249e6cd6fc9040ee1ce1f12731ae1a62ab4f8eee70a0
                          • Instruction Fuzzy Hash: E1D0A7B070422847EB395B74890673D3953EF40710F504415E0027F186DFB50D424B41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f14bb9cd4cc21fa07cd05917d3373e8f80d5e28c118e7587f1f40cb5fa05ffdf
                          • Instruction ID: 710862bc40af91fdb0333f4a3930b458661f12920ab9bb73be1f1e80f68076cf
                          • Opcode Fuzzy Hash: f14bb9cd4cc21fa07cd05917d3373e8f80d5e28c118e7587f1f40cb5fa05ffdf
                          • Instruction Fuzzy Hash: 77D0C97AD061089ACB81EFF0D70A19E7BF4EF4520179049EBC908EB320ED319A14BF81
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 79eafc60b6b675b06f26a54d9b0fc49ae291303aec0c5419a8d46a8d1f784396
                          • Instruction ID: 0e8b81e65b7e4c3a64696d1a778f6d99030a25c0d7d8d595dbb66b17b02c7e69
                          • Opcode Fuzzy Hash: 79eafc60b6b675b06f26a54d9b0fc49ae291303aec0c5419a8d46a8d1f784396
                          • Instruction Fuzzy Hash: D0C012323106144BC615AB69E40495A7BEDEF842213004739F44EC7651EDE1BC4147D4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e03dba4b3319027d03d1d648bc05d51062ce7c86b8fd991b7dd752e5a454b106
                          • Instruction ID: fad1f9552979ff686d9665bd1159d1163c3a020a6877fbe1f8afa700763d916f
                          • Opcode Fuzzy Hash: e03dba4b3319027d03d1d648bc05d51062ce7c86b8fd991b7dd752e5a454b106
                          • Instruction Fuzzy Hash: 6AD0C9B0C1530D9F8B80EFFD940A26EBFF8AA04210F4049AAD80AE3200FB714610CB92
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6a37ea8f26af9c7aa79fe079abd3a39b54c59ee36a2e412066948b4488063584
                          • Instruction ID: 40deecb8da7e67034a3610a4b2fcd292dd2415a328a89215071d5f0c62bb9fa1
                          • Opcode Fuzzy Hash: 6a37ea8f26af9c7aa79fe079abd3a39b54c59ee36a2e412066948b4488063584
                          • Instruction Fuzzy Hash: B5E04278A44215CFCB04CF54C48699DB7B2BF0D311F108055E542AB376C734AC42DF90
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dfe4869c5b5ead2a67928dad6b2257fb7b7f1f53abcb967d6e1ccce1ebe8c385
                          • Instruction ID: 6aaabbe4ee9f0c5eff809d11bb7ed3f364f060e923531c30983546be43ab0225
                          • Opcode Fuzzy Hash: dfe4869c5b5ead2a67928dad6b2257fb7b7f1f53abcb967d6e1ccce1ebe8c385
                          • Instruction Fuzzy Hash: 89D09E70625206CFD759AFB9D45A5297E75FF00312340465CF442C9042DF35CA40FF26
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: da46ec6f9cfd2939f3495677af8e32b5ef4f8416a6744e4c1bf86ba4cc1f59c6
                          • Instruction ID: 727b0d7404ea88274fd999bd7856991fa06f4bd3dac5b295417be0f35c9114aa
                          • Opcode Fuzzy Hash: da46ec6f9cfd2939f3495677af8e32b5ef4f8416a6744e4c1bf86ba4cc1f59c6
                          • Instruction Fuzzy Hash: 3DD0C0FB40000037EB025A50DD07B42BA315B20322F1C4322ED200D1E1F33248E0EB80
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b430a76b4d921f425ec646e64a06e3e1ec9c69283bb8de41e06dde1403e48c68
                          • Instruction ID: 868a27445d3a5430c2f72d9e827f2178809df329aa1b04a94c9a8bb30fa1633c
                          • Opcode Fuzzy Hash: b430a76b4d921f425ec646e64a06e3e1ec9c69283bb8de41e06dde1403e48c68
                          • Instruction Fuzzy Hash: C3D022721482489FCB018FA8E810C847F74AF2A350F1640E2FD848B273C222E824CB98
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e2e51879124d2f54bfb030d210620cb82c2e6ca74388190eaa8d7a782de6ffcb
                          • Instruction ID: bf79fd324c3411d83bd097ac5e1b29e0e1a6a0c555d13fb76f43d8e2b3f0bc2c
                          • Opcode Fuzzy Hash: e2e51879124d2f54bfb030d210620cb82c2e6ca74388190eaa8d7a782de6ffcb
                          • Instruction Fuzzy Hash: EAC012314857444FC715566090550D43B70AA6321531500DBCC05C61A2E616491DC701
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 57fa67fc83d1edf4075774e06197eaa4008a9c8be6bd3e2158641e0e4d5d2fbe
                          • Instruction ID: 01427c879b7fb7ae3f25f2c96e1c4896cbf850a1620c3b27afa772319383d365
                          • Opcode Fuzzy Hash: 57fa67fc83d1edf4075774e06197eaa4008a9c8be6bd3e2158641e0e4d5d2fbe
                          • Instruction Fuzzy Hash: 3BC04C969DE7D01EC71742A46A550513F7159A305230F24D7E4958B762D00455549316
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6634858f997b8192dde422d595a72f93db5295eb3daa80ee2746e257fa454174
                          • Instruction ID: c93b761bba2cb731edfcf3c2e240c34e1a094adc3cdb3d2fe38771313c6b00f4
                          • Opcode Fuzzy Hash: 6634858f997b8192dde422d595a72f93db5295eb3daa80ee2746e257fa454174
                          • Instruction Fuzzy Hash: 5FD0A734A54301DBC304CE1EE856B2ABBB1FF09324718C655E429C21D2DF345C48FB45
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 18874b0d9c97b059be01d280bbee6ccb7a7e87094d2147df6229373c8e0430d6
                          • Instruction ID: 1a6119ccc5885beb253cde38c2e52847cb7b82b6fb43e3192a8ae33be77c7f07
                          • Opcode Fuzzy Hash: 18874b0d9c97b059be01d280bbee6ccb7a7e87094d2147df6229373c8e0430d6
                          • Instruction Fuzzy Hash: E8C002E798E2800EC70241A11E651802F35597704535F24DBD4988AAA3E059895A8715
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ad2c8e2e082be9fbb8f37ae84884118085cece6780e0561a80b1898b6a6e88b5
                          • Instruction ID: 473dace5c93589a8a5523388452ffb69a8ec0e214be781dc554abe95e7e458ad
                          • Opcode Fuzzy Hash: ad2c8e2e082be9fbb8f37ae84884118085cece6780e0561a80b1898b6a6e88b5
                          • Instruction Fuzzy Hash: F0D0123B04825CBBCF416FC9DC45B897F24EB15711F448061FE58194D7C631A020AB69
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8501c91a7f3db93ca8ab85686f5eb33059887f24eb5e5d19b0d2d648a152963b
                          • Instruction ID: 6e69baf64a517a820e87c3e5c5852be712589c4c86edb35a24affcfda8399f19
                          • Opcode Fuzzy Hash: 8501c91a7f3db93ca8ab85686f5eb33059887f24eb5e5d19b0d2d648a152963b
                          • Instruction Fuzzy Hash: F4D012735252118FD708CF31DA856503BF4BF14650B0884D5E44ACB2A2CE38D914EF11
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 244305bd90b5a26f59242cc0f2ef7b58ff1d51a5d7eebd463c6ae9d6e8f7a69a
                          • Instruction ID: 2c74cd5cdc5d8d43c2382814d33b893e949a6358d485d371b483b162988ed511
                          • Opcode Fuzzy Hash: 244305bd90b5a26f59242cc0f2ef7b58ff1d51a5d7eebd463c6ae9d6e8f7a69a
                          • Instruction Fuzzy Hash: 0DC08C35004508CF8304CB16E40CD2577F9BB043303428050F50E5B232C232EC60CA41
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cf4e5afa53b7cd3898ede6caf6931b6d74be1d6166c136fa7e32e5c2442140bd
                          • Instruction ID: 1eacd726907d45370c7ec5e2e29b0cd64b8e11541fb51d30e4e85bdab0407e89
                          • Opcode Fuzzy Hash: cf4e5afa53b7cd3898ede6caf6931b6d74be1d6166c136fa7e32e5c2442140bd
                          • Instruction Fuzzy Hash: A3C09B752C470876E5275551DC07F457A5D9730F51F504121F7041C0D089E27960A65C
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6b890a1878f21bb7f09d862592a755ed2ce311562f5f1a0304c6abbbdd52873e
                          • Instruction ID: 19d07928bc24b9474f7e59cbdd8b8e0d3deed1c7a519eb3c8c8690cf2c067a2b
                          • Opcode Fuzzy Hash: 6b890a1878f21bb7f09d862592a755ed2ce311562f5f1a0304c6abbbdd52873e
                          • Instruction Fuzzy Hash: C5C092303082084B8748D69DE851825F3DA9BCC618328C0BDA80DC7352EE23FC038684
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b3f2a5b5b3c1555369f85d91912d59cdd9a4c22d8b2ef91b2f9b78bb45e15f3f
                          • Instruction ID: 3e9f36b28c520827a7afe9b1ee86fc2b9eaa1b6b02491b4becc8340424834dc1
                          • Opcode Fuzzy Hash: b3f2a5b5b3c1555369f85d91912d59cdd9a4c22d8b2ef91b2f9b78bb45e15f3f
                          • Instruction Fuzzy Hash: 02C08CB204400CABDB190FC6F809AC57F68EB20342F028421FE0846052D272A9228B85
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: aa347f7ab54f62bed42564109280a07721cb2f5e352860cb2f4bf700794d1500
                          • Instruction ID: 4f100f7ba6a35c54ea4951656955122eca43993e8208c3a8e4162ed678eb9fbb
                          • Opcode Fuzzy Hash: aa347f7ab54f62bed42564109280a07721cb2f5e352860cb2f4bf700794d1500
                          • Instruction Fuzzy Hash: 7BC04C351042089B8644DA84D851C15F769EB98624714C459A9094B352CA33F913DA94
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b96c44c7bd0ee0edc9f51cb0fa6b2748460b713b359e5498daa1883276d863b3
                          • Instruction ID: 3be413ce784bb721a01d7bbecc873b9c9f26119a0e5766d287a2eaeac65e7666
                          • Opcode Fuzzy Hash: b96c44c7bd0ee0edc9f51cb0fa6b2748460b713b359e5498daa1883276d863b3
                          • Instruction Fuzzy Hash: 2DC04C3101410CDBEF091FE6FA0AA947B6AF786219F2988B0F50C85512CFA228D29B55
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 969b9fb953701366b41d50dbbfb5f4a4a023b551c7467c172843b1a11bf7ce31
                          • Instruction ID: 3b700d22f3425fab22eb14e9694c6c19528b91ea2475c5bc3bbac3a793d9ea14
                          • Opcode Fuzzy Hash: 969b9fb953701366b41d50dbbfb5f4a4a023b551c7467c172843b1a11bf7ce31
                          • Instruction Fuzzy Hash: 9AC09BB5148508EB8E1CEA41F954D3B7F2A9751301740D415F70F0A561C7739C61D794
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0ce2350cb1c9647576188bf096f274b288ff2e9a39eb3e67edc3d6eeda623ddd
                          • Instruction ID: 556988a9a547ee336f72a66b148fd6356d848be017603c98433c69a88a033015
                          • Opcode Fuzzy Hash: 0ce2350cb1c9647576188bf096f274b288ff2e9a39eb3e67edc3d6eeda623ddd
                          • Instruction Fuzzy Hash: FBB09BB505C208DAC72059C4B40FB657F2B6710F61F404051BA0914492C7A25461F599
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: af8e06a732ca707132f27ef7a83e288a845aad2dfe2584e40d54ff240b01922d
                          • Instruction ID: 2ad57114494cc740969b95bee8f444b209d5990da35e5c480c7824bf6c3857fe
                          • Opcode Fuzzy Hash: af8e06a732ca707132f27ef7a83e288a845aad2dfe2584e40d54ff240b01922d
                          • Instruction Fuzzy Hash: B7C09276140208EFC700DF69E844C45BBB8FF1976071180A1FA088B332C732E820DA94
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7e4f060d823d11b290cbf74cba180be238a5e7a4004b8924e22a763913f7b422
                          • Instruction ID: 8f7eae0b2ed7fa34096eaee9096edb7f51051686e1bf0106afef200aeacd1c54
                          • Opcode Fuzzy Hash: 7e4f060d823d11b290cbf74cba180be238a5e7a4004b8924e22a763913f7b422
                          • Instruction Fuzzy Hash: 17B012734441089BDB001240FC4B740375DD77460BFC40151610C832A2D61EA0104140
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 71b726f09e0872c9926ffac0bfb98999de370a86fae6e2d730b29829e3d26ead
                          • Instruction ID: 64bc0d971bd13af435ea00d18c6c0d36b26fde979382fa2b935c329150548971
                          • Opcode Fuzzy Hash: 71b726f09e0872c9926ffac0bfb98999de370a86fae6e2d730b29829e3d26ead
                          • Instruction Fuzzy Hash: FCB012E005C24896F4045584240A738361E8746723F001100FA0E25DD58ED024502051
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488658593.0000000005760000.00000040.00000800.00020000.00000000.sdmp, Offset: 05760000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5760000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b8852911be378ef57a63294e02a8faf7ffa27e04fd4e45398ae5c16605be03f3
                          • Instruction ID: 6a2a635123cb35968017d12a38a7988d3abc3961477c9a53fa01248471d98849
                          • Opcode Fuzzy Hash: b8852911be378ef57a63294e02a8faf7ffa27e04fd4e45398ae5c16605be03f3
                          • Instruction Fuzzy Hash: A8C048302081198B8344DA94E582818BBA9AB84618324D0AEE92D8F612CB32EA038E80
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 54bbe7907bc558d6f9776635c958f7e81386e64515badd73cd8423782fe9be29
                          • Instruction ID: 9609da387cc09f0419979cc9511e1c37f267b742d3f5ae6527028c52afea5d53
                          • Opcode Fuzzy Hash: 54bbe7907bc558d6f9776635c958f7e81386e64515badd73cd8423782fe9be29
                          • Instruction Fuzzy Hash: E5B0123204430CBBC6401AC5E806FC57F1CD755762F008011F70804040CAB25160AAAD
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 418804ba49e1aebc8fa1d3dc0919575ec75d589b23f2178018c5335086f87319
                          • Instruction ID: 9c1d638d28ae4b7c3dd7acd5f35345a8f978fe62c4878920a0d217ca8927f91a
                          • Opcode Fuzzy Hash: 418804ba49e1aebc8fa1d3dc0919575ec75d589b23f2178018c5335086f87319
                          • Instruction Fuzzy Hash: B2B01230260208CFC200DB5DD444C0033FCBF49E0434000D0F1088B731C721FC008A40
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: beeefdf74881fcd807cd8820e1816766b330ce91165ed5ef9ac134688932584f
                          • Instruction ID: e94cae714771b65efa603eb5ada844e7c3d635027a6e616207d92db2e31618a8
                          • Opcode Fuzzy Hash: beeefdf74881fcd807cd8820e1816766b330ce91165ed5ef9ac134688932584f
                          • Instruction Fuzzy Hash: 2FB0123101020C9F8B051A55F80BC997F5DD750611740C035F50446011DF716860A5D8
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cdfb1d108f301f18e5bfae1c148097a6bf02a2a59374714cce007b80d511cc6e
                          • Instruction ID: 1f0c00f89a229a7fea2a43db1d7b12adfa236afe0461d02693cef37a8bd1c6cf
                          • Opcode Fuzzy Hash: cdfb1d108f301f18e5bfae1c148097a6bf02a2a59374714cce007b80d511cc6e
                          • Instruction Fuzzy Hash: 41B0127100010CA787001E41E8048CD7F1CD7102617404021F50801030873364609694
                          Memory Dump Source
                          • Source File: 00000004.00000002.3489923673.0000000005C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C00000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5c00000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1ff429929165e68f57d91f0c51b3deb0489c77714c1b9dd3bd754e59358f10e6
                          • Instruction ID: 4061a022c8a343396c6f3f043206453d7aeb0e111f5ce543aa893fdc1a47fc58
                          • Opcode Fuzzy Hash: 1ff429929165e68f57d91f0c51b3deb0489c77714c1b9dd3bd754e59358f10e6
                          • Instruction Fuzzy Hash: 8AA0113002820CAB8A002AA2FC0A800BF2EE2822203008020F00C022228EA32CA08AA2
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cc0eed996bbf40ac1f0cbe8e94787c8abe72e039e40d3fd1e2248e086b8b1e6e
                          • Instruction ID: 35c3991e62c6a432864d522e42afe962a2581d80ed9f3ef8b92aa778028e8e30
                          • Opcode Fuzzy Hash: cc0eed996bbf40ac1f0cbe8e94787c8abe72e039e40d3fd1e2248e086b8b1e6e
                          • Instruction Fuzzy Hash: DBA02232002B0CCBC3002BB8B00A020BBACFA0020A38000B8F20C00A20CF33E020CAA8
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d3b39318856e8562c7e1b750f89b535f23aa21c4bb44887310d51623a9db674f
                          • Instruction ID: ff5d54d332d9979fcf69bbe1ea544154e0685341c9b665f8733cba22c3c68f2b
                          • Opcode Fuzzy Hash: d3b39318856e8562c7e1b750f89b535f23aa21c4bb44887310d51623a9db674f
                          • Instruction Fuzzy Hash: 7190443000030CCF000033C0F00C000333CC3000033C000C0F00C030000F0C300003C0
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488248527.0000000005730000.00000040.00000800.00020000.00000000.sdmp, Offset: 05730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5730000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8a112d4708555eba3692e5142bc21cfe55c53fcf7460ce96c38bdf8cf2e36e49
                          • Instruction ID: e7590b6ac86bfe121f84580d12694a4a98e34640e791c900e72c3991605898c5
                          • Opcode Fuzzy Hash: 8a112d4708555eba3692e5142bc21cfe55c53fcf7460ce96c38bdf8cf2e36e49
                          • Instruction Fuzzy Hash: DB90023105471C8F49842799B54E5567F5C99849557804051B54D496019E5564105A99
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ec223e0d540459b8ccbd8b37aad89f63f4f19bca0214122ebb4e74aac89c90ce
                          • Instruction ID: 6f073b7e3ecc0144753a3e0a62275230af61b30be8672874c7ae4ab1d1d49e01
                          • Opcode Fuzzy Hash: ec223e0d540459b8ccbd8b37aad89f63f4f19bca0214122ebb4e74aac89c90ce
                          • Instruction Fuzzy Hash:
                          Memory Dump Source
                          • Source File: 00000004.00000002.3488447433.0000000005750000.00000040.00000800.00020000.00000000.sdmp, Offset: 05750000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_4_2_5750000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: edda6a36872801613fd40c28677721f3a05b3cd123960256137cc0d08e561c2f
                          • Instruction ID: 35542733c7e59f90780b8d4040c5f175cbaea35e34fe7f77a756d4b8bf9ac629
                          • Opcode Fuzzy Hash: edda6a36872801613fd40c28677721f3a05b3cd123960256137cc0d08e561c2f
                          • Instruction Fuzzy Hash:

                          Execution Graph

                          Execution Coverage:7.4%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:13
                          Total number of Limit Nodes:1
                          execution_graph 18877 5901c60 18878 5901c7d 18877->18878 18879 5901c8d 18878->18879 18882 5907dba 18878->18882 18886 590972c 18878->18886 18889 590f3d0 18882->18889 18883 5907de5 18888 590f3d0 VirtualProtect 18886->18888 18887 590974a 18888->18887 18891 590f3f7 18889->18891 18893 590f8d0 18891->18893 18894 590f919 VirtualProtect 18893->18894 18896 59078be 18894->18896 18896->18882 18896->18883

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 340 778d240-778d268 341 778d26a 340->341 342 778d26f-778d2b1 340->342 341->342 343 778d338-778d33f 342->343 344 778d2b7-778d332 call 778d6c8 342->344 345 778d4e8-778d533 343->345 346 778d345-778d3ca 343->346 344->343 356 778d588-778d64f 345->356 357 778d535-778d54e 345->357 369 778d3d0-778d44c 346->369 370 778d4e2 346->370 373 778d66e-778d674 356->373 357->356 363 778d550-778d583 357->363 363->373 386 778d4ab-778d4b4 369->386 370->345 374 778d67e 373->374 375 778d676 373->375 375->374 387 778d44e-778d457 386->387 388 778d4b6-778d4ba 386->388 391 778d459 387->391 392 778d45e-778d496 387->392 388->370 390 778d4bc-778d4d7 388->390 390->370 391->392 398 778d4a8 392->398 399 778d498-778d4a6 392->399 398->386 399->388
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: Djq
                          • API String ID: 0-3204991199
                          • Opcode ID: 1ff6ee0494be66d1a3194ba84136ee95cb222bb945e74b68251aa584a64e2a51
                          • Instruction ID: 9fba4558d42ee3bdff778e71740180364a09f57f0a3d07027167d53229429170
                          • Opcode Fuzzy Hash: 1ff6ee0494be66d1a3194ba84136ee95cb222bb945e74b68251aa584a64e2a51
                          • Instruction Fuzzy Hash: F3D1E6B4E00219CFDB54DFA9D984A9DBBB2FF89300F5081A9D409AB365DB35AD81CF50
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fc72f69cb7d2178763496024e1dfbd0bfb1fa87e575e8391a2a608e731ce9d78
                          • Instruction ID: 9c15bb49235b94896566b4f65487b2b16c5d14d10d28c14a852226bdc94147de
                          • Opcode Fuzzy Hash: fc72f69cb7d2178763496024e1dfbd0bfb1fa87e575e8391a2a608e731ce9d78
                          • Instruction Fuzzy Hash: 25513874A01208DFDB94DF69D994BA9B7F2FB4D310F5085AAD40AAB351DB389E80CF11

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 18a4ac3-18a4acd 1 18a4a58 0->1 2 18a4acf 0->2 3 18a4a7a-18a4ab1 1->3 4 18a4a5a-18a4a78 1->4 7 18a3a21-18a3a2c 3->7 4->3 9 18a3a3a-18a3a6b 7->9 10 18a3a6d-18a3aa2 7->10 11 18a3aa7-18a3b9c 7->11 9->7 10->7 35 18a4efa 11->35 36 18a3ba2 11->36 35->35 37 18a3baa-18a3dda 36->37 37->35 50 18a3de0-18a3ef9 37->50 50->35 57 18a3eff-18a4042 50->57 57->35 64 18a4048-18a418b 57->64 64->35 71 18a4191-18a4a57 64->71 71->1
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: f10755d97bb9995a0e8aae6a4c6a0f5f2f54643798a8b24f2bcdcb706eee62c3
                          • Instruction ID: 43fa56c79da40b44d0ff26282fd15ca22630433f0d50cdd545e5bb988a3853b0
                          • Opcode Fuzzy Hash: f10755d97bb9995a0e8aae6a4c6a0f5f2f54643798a8b24f2bcdcb706eee62c3
                          • Instruction Fuzzy Hash: 81D2077A250510EFDB4A8F98D948D55BBB2FF4D32475A81D8F6099B232C732E861EF40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 125 18a3521-18a3528 126 18a352a-18a3530 125->126 127 18a3571-18a3576 125->127 129 18a35f2-18a35fa 127->129 130 18a357d-18a3580 129->130 131 18a35a0-18a35a5 130->131 133 18a3587-18a3590 131->133 134 18a3599-18a359e 133->134 135 18a3592 133->135 134->133 135->129 135->130 135->131 135->134 136 18a360e-18a3651 135->136 137 18a3582-18a3585 135->137 138 18a35a7-18a35af 135->138 139 18a367a-18a367f 135->139 140 18a3578-18a357b 135->140 141 18a35bc-18a35c2 135->141 142 18a35dc-18a35e2 135->142 143 18a35fc-18a35fe 135->143 144 18a35d2-18a35da 135->144 145 18a3656-18a3675 135->145 136->140 137->134 151 18a35b8-18a35ba 138->151 152 18a35b1 138->152 150 18a3683-18a3685 139->150 140->144 153 18a35cb-18a35d0 141->153 154 18a35c4 141->154 146 18a35eb-18a35f0 142->146 147 18a35e4 142->147 148 18a3681 143->148 149 18a3604-18a3609 143->149 144->137 145->140 146->130 147->136 147->139 147->143 147->145 147->146 148->150 149->140 157 18a36a1-18a36f8 150->157 158 18a3687-18a369f 150->158 151->133 152->129 152->130 152->136 152->139 152->140 152->141 152->142 152->143 152->144 152->145 152->151 153->137 154->129 154->136 154->139 154->140 154->142 154->143 154->145 154->153 172 18a36fa-18a3700 157->172 173 18a3710-18a377f call 18a4ac3 157->173 158->157 174 18a3702 172->174 175 18a3704-18a3706 172->175 182 18a3785-18a3787 173->182 174->173 175->173 183 18a3789-18a378f 182->183 184 18a379f-18a37a6 182->184 185 18a3793-18a3795 183->185 186 18a3791 183->186 185->184 186->184
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: d%iq$d%iq$$cq$$cq
                          • API String ID: 0-476168907
                          • Opcode ID: f080a5254f29e5fd1b2b5dcd559dd4fd9ab1bae02324572f0db1abc4cba6243e
                          • Instruction ID: ed981019b9f0ae43356e06b77a239b94f527679355b5b267dd1e569fe8a8f3e9
                          • Opcode Fuzzy Hash: f080a5254f29e5fd1b2b5dcd559dd4fd9ab1bae02324572f0db1abc4cba6243e
                          • Instruction Fuzzy Hash: 4851F170B002189BE7198A3C8C11B3B7A97FB89314FA5457AED06DB3D5DE31CE418792

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 188 18a391a-18a391d 189 18a391f 188->189 190 18a3923-18a39b6 188->190 189->190 191 18a4efa 189->191 190->191 191->191
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 480e28a788bc54ca315996a5a69ddb3468ed7d9c00e9a6c9171d209eba54d329
                          • Instruction ID: a1fb870c97cd4aeeeb8b56eefeb7ca714c2cd784c9c6460a0ddb02e55b616eb6
                          • Opcode Fuzzy Hash: 480e28a788bc54ca315996a5a69ddb3468ed7d9c00e9a6c9171d209eba54d329
                          • Instruction Fuzzy Hash: 8AC08C2100E284CFFF034E2884C00387E24BF5330434CC4D5D8428F00BC2B89686E322

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 193 18a3538-18a3544 194 18a35a2-18a35a5 193->194 195 18a3546-18a3576 193->195 196 18a3587-18a3590 194->196 212 18a35f2-18a35fa 195->212 198 18a3599-18a359e 196->198 199 18a3592 196->199 198->196 199->198 201 18a360e-18a3651 199->201 202 18a3582-18a3585 199->202 203 18a35a0 199->203 204 18a35a7-18a35af 199->204 205 18a367a-18a367f 199->205 206 18a3578-18a357b 199->206 207 18a35bc-18a35c2 199->207 208 18a35dc-18a35e2 199->208 209 18a35fc-18a35fe 199->209 210 18a357d-18a3580 199->210 211 18a35d2-18a35da 199->211 199->212 213 18a3656-18a3675 199->213 201->206 202->198 203->194 219 18a35b8-18a35ba 204->219 220 18a35b1 204->220 218 18a3683-18a3685 205->218 206->211 221 18a35cb-18a35d0 207->221 222 18a35c4 207->222 214 18a35eb-18a35f0 208->214 215 18a35e4 208->215 216 18a3681 209->216 217 18a3604-18a3609 209->217 210->203 211->202 212->210 213->206 214->210 215->201 215->205 215->209 215->213 215->214 216->218 217->206 226 18a36a1-18a36f8 218->226 227 18a3687-18a369f 218->227 219->196 220->201 220->205 220->206 220->207 220->208 220->209 220->210 220->211 220->212 220->213 220->219 221->202 222->201 222->205 222->206 222->208 222->209 222->212 222->213 222->221 241 18a36fa-18a3700 226->241 242 18a3710-18a377f call 18a4ac3 226->242 227->226 243 18a3702 241->243 244 18a3704-18a3706 241->244 251 18a3785-18a3787 242->251 243->242 244->242 252 18a3789-18a378f 251->252 253 18a379f-18a37a6 251->253 254 18a3793-18a3795 252->254 255 18a3791 252->255 254->253 255->253
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: d%iq$d%iq$$cq
                          • API String ID: 0-3404570328
                          • Opcode ID: 973b6a95d1501a9734ea3890459279df0aac01ab5e7c194bf75bf9971a9f173a
                          • Instruction ID: 9fc34f7df276a84ce6af60e9be3730e3869f245e1f1b8ec409dd48f91bb5d3e7
                          • Opcode Fuzzy Hash: 973b6a95d1501a9734ea3890459279df0aac01ab5e7c194bf75bf9971a9f173a
                          • Instruction Fuzzy Hash: 47510170B002189BE718CA3D8C51B3BBAA6FBC9310FA1457AED06DB3D5DA71DE018791

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 257 18a572f-18a5807 call 18a5568 * 2 call 18a0198 call 18a5278 call 18a01a8 call 18a5288 280 18a580c-18a583a 257->280 284 18a583c 280->284 285 18a5845 280->285 284->285 286 18a5846 285->286 286->286
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: Tecq$Tecq
                          • API String ID: 0-2088518435
                          • Opcode ID: f8959d045ed84bd3109ddbc4790756ce07f47eb47028c2a5e6a1bc763b2f1577
                          • Instruction ID: c4492c4933e265ac1dd21c96c59d1f2015bfbd3b21a9a2ad932eb2bf5bc203ec
                          • Opcode Fuzzy Hash: f8959d045ed84bd3109ddbc4790756ce07f47eb47028c2a5e6a1bc763b2f1577
                          • Instruction Fuzzy Hash: A5317070B001059FDB09DFBDC5546AEBAE7AF88300F504468E402EB3A1CE749E41CB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 287 18a5738-18a5807 call 18a5568 * 2 call 18a0198 call 18a5278 call 18a01a8 call 18a5288 309 18a580c-18a583a 287->309 313 18a583c 309->313 314 18a5845 309->314 313->314 315 18a5846 314->315 315->315
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: Tecq$Tecq
                          • API String ID: 0-2088518435
                          • Opcode ID: aea0f637bf8c5ff0283eae984bded6647cbe56e270dcb2ed4ecd0aa447163758
                          • Instruction ID: 56df183130b3067ba619a2a97031bb6cae9b47ccbe6e84702ca9f02c8f875ac2
                          • Opcode Fuzzy Hash: aea0f637bf8c5ff0283eae984bded6647cbe56e270dcb2ed4ecd0aa447163758
                          • Instruction Fuzzy Hash: 31315E70B001099FDB48EFBDC5546AEBAE7AF88310FA44469E406FB391CE749E41CB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 316 7d50782-7d50789 317 7d50c9f-7d50cb3 316->317 318 7d5078f-7d507ae 316->318 328 7d50cb6 call 7d526a3 317->328 329 7d50cb6 call 7d52708 317->329 330 7d50cb6 call 7d526f8 317->330 319 7d50135-7d5013e 318->319 320 7d507b4-7d507bf 318->320 321 7d50147-7d50f70 319->321 322 7d50140-7d507c4 319->322 320->319 321->319 326 7d507ca-7d507ff 322->326 323 7d50cbc-7d50ce0 326->319 327 7d50805-7d50810 326->327 327->319 328->323 329->323 330->323
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: &$A
                          • API String ID: 0-867333088
                          • Opcode ID: 3d048acd3c19d97e26dd1ae8a645cd685047e7a2cddb4c4c3191328a53bf5c8d
                          • Instruction ID: cdfdd89ff69874f94d565676e9d52d8d0233fee34841e212bc0b504cd52d8bec
                          • Opcode Fuzzy Hash: 3d048acd3c19d97e26dd1ae8a645cd685047e7a2cddb4c4c3191328a53bf5c8d
                          • Instruction Fuzzy Hash: 7C01F2B494166ACFDF248F64DA08BEDBBB1BB45346F4040E9D908AA290E3794EC4DF11

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 331 590f8d0-590f984 VirtualProtect 334 590f986-590f98c 331->334 335 590f98d-590f9d5 331->335 334->335
                          APIs
                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0590F974
                          Memory Dump Source
                          • Source File: 00000005.00000002.3267106503.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_5900000_cvchost.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: a9ef82bcdf275722106b9877e16e558e951c429d547b796f9df3e4ae3818ae96
                          • Instruction ID: 41ac4e12074fbc78c126f0c7e4358c968fdbc2834323caec6f9cbed63cb6fc66
                          • Opcode Fuzzy Hash: a9ef82bcdf275722106b9877e16e558e951c429d547b796f9df3e4ae3818ae96
                          • Instruction Fuzzy Hash: FA31A7B9D00248AFCF10CFA9D980A9EFBB5FB59310F14A42AE828B7210D735A945CF54

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 401 18a14a8-18a14c5 call 18a0198 405 18a14c7-18a14c9 401->405 406 18a14d4 401->406 407 18a14d9-18a14db 405->407 406->407 408 18a15e1-18a15e5 407->408 409 18a14e1-18a150b call 18a01a8 407->409 410 18a15fe-18a160b 408->410 411 18a15e7-18a15fc 408->411 421 18a1510-18a1515 409->421 415 18a1613-18a162c 410->415 411->415 422 18a151d-18a1536 421->422 424 18a1538-18a153a 422->424 425 18a153c 422->425 426 18a1541-18a1543 424->426 425->426 427 18a154e 426->427 428 18a1545 426->428 427->408 428->427
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: Tecq
                          • API String ID: 0-1122318316
                          • Opcode ID: 9f7fbbfe446adbd429534fa06e1d69e08d11efe8cd243a0fca5c0d5bd2289bcf
                          • Instruction ID: 12c7b2e0214ba64474cc3e089ea935763e79adc00908c0ddf744d5a2c4cc73ea
                          • Opcode Fuzzy Hash: 9f7fbbfe446adbd429534fa06e1d69e08d11efe8cd243a0fca5c0d5bd2289bcf
                          • Instruction Fuzzy Hash: BB31F674B006198FEB14DBA9D498BADB7B2FF88315F5444A9E902DB3A1CB749A01CB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 429 778d850-778d872 430 778d879-778d8a0 429->430 431 778d874 429->431 436 778d8a8-778d8d3 430->436 431->430 440 778d8dd-778d8e2 436->440 441 778d8d5-778d8db 436->441 442 778d8e4-778d8e5 440->442 443 778d8e7-778d8ee 440->443 441->440 442->443
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq
                          • API String ID: 0-182294849
                          • Opcode ID: 8a53d10a4e466e9dc2721863a781572f9b849bd222d66107203c1ec0f59951fc
                          • Instruction ID: 1025e982d15a71b4eea9fba90aa356f5f11909f59084c5f3a64a9a39fce44e68
                          • Opcode Fuzzy Hash: 8a53d10a4e466e9dc2721863a781572f9b849bd222d66107203c1ec0f59951fc
                          • Instruction Fuzzy Hash: DC1146B1E4120A8BCB55EBA9C8405EEBBF9FF8D340F10857AD405A7290EB3499408B90

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 464 7d50272-7d50293 474 7d50296 call 7d526a3 464->474 475 7d50296 call 7d52708 464->475 476 7d50296 call 7d526f8 464->476 465 7d5029c-7d502d7 466 7d50135-7d5013e 465->466 467 7d502dd-7d502e8 465->467 468 7d50147-7d50f70 466->468 469 7d50140-7d507c4 466->469 467->466 468->466 472 7d507ca-7d507ff 469->472 472->466 473 7d50805-7d50810 472->473 473->466 474->465 475->465 476->465
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: "
                          • API String ID: 0-123907689
                          • Opcode ID: 3acbec7e56cee08964c97be233cfaf2da12ab54a607661eebefcdd6a40c17653
                          • Instruction ID: ba97c352e39c61023495e70c77696f4a1884edc15210babeccf17a7215fa0c9d
                          • Opcode Fuzzy Hash: 3acbec7e56cee08964c97be233cfaf2da12ab54a607661eebefcdd6a40c17653
                          • Instruction Fuzzy Hash: 8A01F2B8941229CFDF20CF54D988FE9B7B1EB09300F1080E5E908A7251D3799E80CF10

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 477 7d5090d-7d5093a 490 7d50940 call 7d52890 477->490 491 7d50940 call 7d52880 477->491 492 7d50940 call 7d528cb 477->492 481 7d50946-7d5097a 482 7d50135-7d5013e 481->482 483 7d50980-7d5098b 481->483 484 7d50147-7d50f70 482->484 485 7d50140-7d507c4 482->485 483->482 484->482 488 7d507ca-7d507ff 485->488 488->482 489 7d50805-7d50810 488->489 489->482 490->481 491->481 492->481
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: /
                          • API String ID: 0-2043925204
                          • Opcode ID: 31cb07bb657ada861d4dd129a4684fa31bc64c47eb6e0073d0a9bf67c1bcad08
                          • Instruction ID: 486f867e5bb5fe511c56ab1baa84ab99f1cada5134a1e8059a61115905f5d7f7
                          • Opcode Fuzzy Hash: 31cb07bb657ada861d4dd129a4684fa31bc64c47eb6e0073d0a9bf67c1bcad08
                          • Instruction Fuzzy Hash: CB01AFB498222ACFEB29CF29D854FE8B7B1FB49350F4041E9C809A7650DB359E80CF11

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 493 7d502ed-7d502f4 494 7d50933-7d5093a 493->494 495 7d502fa-7d50305 493->495 505 7d50940 call 7d52890 494->505 506 7d50940 call 7d52880 494->506 507 7d50940 call 7d528cb 494->507 496 7d50135-7d5013e 495->496 497 7d50147-7d50f70 496->497 498 7d50140-7d507c4 496->498 497->496 503 7d507ca-7d507ff 498->503 499 7d50946-7d5097a 499->496 500 7d50980-7d5098b 499->500 500->496 503->496 504 7d50805-7d50810 503->504 504->496 505->499 506->499 507->499
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: /
                          • API String ID: 0-2043925204
                          • Opcode ID: 1463d06dd4e3e366dbea5d8a4d58b7e3ff69d34f1f5b74b85d802bcc361080bb
                          • Instruction ID: 2d8a4be954d4bc394cc638045c5e0abb22cb727ff8cc451d6cbe02ce7a294f70
                          • Opcode Fuzzy Hash: 1463d06dd4e3e366dbea5d8a4d58b7e3ff69d34f1f5b74b85d802bcc361080bb
                          • Instruction Fuzzy Hash: 4601C4B494221ACFEB24CF28D948FE9B7F5BB09341F4041EAC808A7650E3359E80CF11
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: 7
                          • API String ID: 0-1790921346
                          • Opcode ID: a8230082b23004146242679ea2e081fcf78f9254eaadc5a0809c8d17382a39d5
                          • Instruction ID: 7e983acfb2f8026128ff277a626df35a38e0800b84ea5a049438d5e1709e4546
                          • Opcode Fuzzy Hash: a8230082b23004146242679ea2e081fcf78f9254eaadc5a0809c8d17382a39d5
                          • Instruction Fuzzy Hash: E2F0FFB0902229DBCF29DFA0DA54BEDBBB1BF49304F001099D509A6290DB742E80CF06
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: 8
                          • API String ID: 0-4194326291
                          • Opcode ID: d533caf80f0b8c8fe0b8b9e83475e36cb2c91392fb8892983bc1a1920c2662f8
                          • Instruction ID: 74fbaa7b3ee1cbae47c0b6fcb4fca95ab7d00baf080d7f25baec1e0f923a3f3d
                          • Opcode Fuzzy Hash: d533caf80f0b8c8fe0b8b9e83475e36cb2c91392fb8892983bc1a1920c2662f8
                          • Instruction Fuzzy Hash: B7F0A4B498221ACFDB64CF24DA88FE8B7B5BB05355F5041E9D408A7650E7399EC4DF10
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: A
                          • API String ID: 0-3554254475
                          • Opcode ID: 7a251734b628c128d219cd9e01f0025cf1f6f82af5ba059a20791cd5df342f56
                          • Instruction ID: cc0c45000d2ce363e692d190bb34fbe8b0fc13870f50881e71317ec80f56e640
                          • Opcode Fuzzy Hash: 7a251734b628c128d219cd9e01f0025cf1f6f82af5ba059a20791cd5df342f56
                          • Instruction Fuzzy Hash: 3FF0D47191126ADFDF289FA0D918BECBB72BB85305F5054999909A6290CB380EC4DF11
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: A
                          • API String ID: 0-3554254475
                          • Opcode ID: ee9868ca13803dead987a745c95958053391f08d62478d692b55cf7e1c2a2f2e
                          • Instruction ID: 43419b507441334ac622d1d2dfa1a9cc1d506d6d689799f23d664ce2599df905
                          • Opcode Fuzzy Hash: ee9868ca13803dead987a745c95958053391f08d62478d692b55cf7e1c2a2f2e
                          • Instruction Fuzzy Hash: C6F039B1811229DFDF248FA0C908BEDBB71BB05345F0040D5D949A6290D3780AC8DF11
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: !
                          • API String ID: 0-2657877971
                          • Opcode ID: deb7bb592563d8d7089b32cbe4c12600c326ed22241d355b25b11b91338b01d5
                          • Instruction ID: 1d842f197b85cdc20996b29bf1902f4f6c25f24af2e956c53597149b98756d4b
                          • Opcode Fuzzy Hash: deb7bb592563d8d7089b32cbe4c12600c326ed22241d355b25b11b91338b01d5
                          • Instruction Fuzzy Hash: 17F07FB494122ACBDBA0CF68D984B99B7B5BB09315F5040D9C908A7741E7759E84CF11
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: '
                          • API String ID: 0-1997036262
                          • Opcode ID: 5dbec0626178788de7cfef6b5625faefb1659742fc353ec64b63c60fbba077f2
                          • Instruction ID: 79a7463e03c46bebad4378eb0d019bacee92785bbc2bcf843b54829a1254ca7f
                          • Opcode Fuzzy Hash: 5dbec0626178788de7cfef6b5625faefb1659742fc353ec64b63c60fbba077f2
                          • Instruction Fuzzy Hash: 27E0B674A45308DFDB51CF94C951B98BBB5AB4C704F208188950DAB380C775AE42CF00
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 530ca788b164bfb6cb30fbfc1adff3046062a80a5931713df50e815585fe7c9b
                          • Instruction ID: 9cef26b65072d1b934aa068879eeac81f13313c8eb353d9ca836130b08c5be91
                          • Opcode Fuzzy Hash: 530ca788b164bfb6cb30fbfc1adff3046062a80a5931713df50e815585fe7c9b
                          • Instruction Fuzzy Hash: C642D2B4905258CFE320CF0CD588A68BBB6FB04309F96D099D4159B266C3BADE89DF51
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: de28d40c276020a61d8fe610e7fe2e55c18da86dcf527097696a7e29aa4d51d4
                          • Instruction ID: 7c6555d131e1ff951581f2fda6ca6fe6a4d0c82976aeea1340be6b5803762b87
                          • Opcode Fuzzy Hash: de28d40c276020a61d8fe610e7fe2e55c18da86dcf527097696a7e29aa4d51d4
                          • Instruction Fuzzy Hash: B832D0B0905254CFE320CF0CD588A68BBE6FB04709F96D099D4159F2A6C3BADE89DF51
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1db49100c12c61d9ec57d93909bb05f133cc75b3e40084c3debf67a4e7476ae6
                          • Instruction ID: 39824602303f2010edd1898b7b8571758f645003d5730a568d480c2422da71a6
                          • Opcode Fuzzy Hash: 1db49100c12c61d9ec57d93909bb05f133cc75b3e40084c3debf67a4e7476ae6
                          • Instruction Fuzzy Hash: A2816C34A04609DFEB34CF68C484AAAB7F2FF48310F94852AD506D7752D734EA81CB91
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f3b456041683cb03f07f69922b3e516ed7a332cc57e6978e8936e5b34390318b
                          • Instruction ID: f367da4c9a2b5c50fff68ff9b81f169fa32b74520ffd82d609d7907390f753ad
                          • Opcode Fuzzy Hash: f3b456041683cb03f07f69922b3e516ed7a332cc57e6978e8936e5b34390318b
                          • Instruction Fuzzy Hash: D1816F75A0011ACFEB25DF98C890AEEB7B2FF44304F958565E905FB242D730AB46CB91
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b6382fbe156895e6f4cc88661059bc16de47bd6877cf48956dd42322903987e5
                          • Instruction ID: 1036871f5e72bcf12e8e226133cd43a338c0b4659c976151d09c5538c796c139
                          • Opcode Fuzzy Hash: b6382fbe156895e6f4cc88661059bc16de47bd6877cf48956dd42322903987e5
                          • Instruction Fuzzy Hash: B88117B5A40218CFCB54EF68C48499EBBF5FF88350B1585AAE806DB361DB70ED41CB90
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 35b38ae2cd6e041b88d840f8d48c8e6f45957ca1478798302c8ed24c0dddee69
                          • Instruction ID: 0326e35d59e531dd68f49a9356d74bf2f76c53b26bcbbc049652b19369a0f869
                          • Opcode Fuzzy Hash: 35b38ae2cd6e041b88d840f8d48c8e6f45957ca1478798302c8ed24c0dddee69
                          • Instruction Fuzzy Hash: 11514975A00609DFEB24CFA9C444AAAF7F6FF48310F50852AE946D7751D331EA41CB91
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d4b0087cd14dd3b784881aefb23bfdc5c90979a735ef6518d1f5adb0db7fa624
                          • Instruction ID: 9b63d8b72ec497e7e76f2b3c74471ba34f098eab2f8d490e633ac58ed3ca29b6
                          • Opcode Fuzzy Hash: d4b0087cd14dd3b784881aefb23bfdc5c90979a735ef6518d1f5adb0db7fa624
                          • Instruction Fuzzy Hash: B1418035F102198FEB59DA69C4186BF7BA6FBC9300F949569C605C7288EF748E42C782
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 93947db550d48034d7acbde9014298d99dc2b19682def73df8524c170acd3b52
                          • Instruction ID: a9ef455cd84b39c23150d467803438de096dffc4bb579c361e8c1cdff25f6d23
                          • Opcode Fuzzy Hash: 93947db550d48034d7acbde9014298d99dc2b19682def73df8524c170acd3b52
                          • Instruction Fuzzy Hash: BC412930A0060ACFEB21DFA4C880AADB773FF44354F99896AE516EB212D734A745CB51
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c3faa177091244ac8b31af9ff5bf094784b1dbaa303978681afa17a3c4a8b652
                          • Instruction ID: 5010de1a3405380aeeb4557a13bc114c1a365bdf15f9e872d3eda2a0c363f9be
                          • Opcode Fuzzy Hash: c3faa177091244ac8b31af9ff5bf094784b1dbaa303978681afa17a3c4a8b652
                          • Instruction Fuzzy Hash: 4731B670E052099FDB09CFA9D550A9EBBF2FF85300F64456AE905EB341DB70AD45CB81
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c9044006919c6f50ebbc8042fda2f5b3f2c2cc0739c5de65388371ca6c0bd7cc
                          • Instruction ID: 4f7064bd72ce745b8571667da378eb6c434e2c0017a11847ec7cb0ccd4a97cf7
                          • Opcode Fuzzy Hash: c9044006919c6f50ebbc8042fda2f5b3f2c2cc0739c5de65388371ca6c0bd7cc
                          • Instruction Fuzzy Hash: FF5117B4D04229DFDBA1CF29CD84BD9BBF5BB49300F5081EAA95DA7210E7319E859F40
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1a4d4b5c4f87278192130daef62e3a09a7d2523cfaad85ccf85758a120632bb4
                          • Instruction ID: ff29b80d989a552ccd124efea5cbe4e7aafcff2f1d524b1c89cc250ba4d1c088
                          • Opcode Fuzzy Hash: 1a4d4b5c4f87278192130daef62e3a09a7d2523cfaad85ccf85758a120632bb4
                          • Instruction Fuzzy Hash: 8E31C338B043198FFB15DA64D51867B7FB6FBC5350F9894A9C905C7289EB748E01CB82
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 52cc4dfdd4eabbfb9691e0d0a81dbcd1610958a721516b9147017333c1837c57
                          • Instruction ID: 695d94f178ff8e9d3b1d3536d23aaf9642efd2aa897b18eddbabe294f70b1c64
                          • Opcode Fuzzy Hash: 52cc4dfdd4eabbfb9691e0d0a81dbcd1610958a721516b9147017333c1837c57
                          • Instruction Fuzzy Hash: C3318070E1124A9FDB49CFA5C55069EBBF2BF89300F65816AE901EB351DB70AD85CB80
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0f57b954148567efb743c78a6d3148c9ee94fa1138cf30d1d2c32e68a4d6a969
                          • Instruction ID: dfb65a5a999ad304a0de27ca73bc2618f5aa86bb4b8fb196afbb20209f4f8d7f
                          • Opcode Fuzzy Hash: 0f57b954148567efb743c78a6d3148c9ee94fa1138cf30d1d2c32e68a4d6a969
                          • Instruction Fuzzy Hash: 8E419EB4D1522CCFEF24CF69D844BD9BBB5BB4A304F4492DAD849AB241D3799A84CF10
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 72c9371021148d56fbdaa4d288627087d578b8146a11c62ea462260212286d1f
                          • Instruction ID: bd6fe02fac64748fb344f4809978e2464c0fc170b0e54c026e7a53269c156a0b
                          • Opcode Fuzzy Hash: 72c9371021148d56fbdaa4d288627087d578b8146a11c62ea462260212286d1f
                          • Instruction Fuzzy Hash: 03212D313187455FF761897DD96C3AA7BD4EB40358F84453AE442C6281F7A4FB45C351
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 86603bac932a7d0257f2ad996b700f4a03eb121e8dc4ff60e2b30e1d80b525fb
                          • Instruction ID: e6093caacbcb280f5e07480c62d428bef17a96c55a8ac2404f379698103b9ada
                          • Opcode Fuzzy Hash: 86603bac932a7d0257f2ad996b700f4a03eb121e8dc4ff60e2b30e1d80b525fb
                          • Instruction Fuzzy Hash: 3C4138B5D0462DDFDBA1CF69CD84BD9BBF5BB49300F1081EAA84DA7210E7319A858F40
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 81f27ff286fc912d325b966e4af4b5fcc41412f99ca42e1b41f3860f042a0d4f
                          • Instruction ID: a8fbf3779014fd5e0c6f71da0882b9659bc7f11a296cab9c9cd38c05e90b87bb
                          • Opcode Fuzzy Hash: 81f27ff286fc912d325b966e4af4b5fcc41412f99ca42e1b41f3860f042a0d4f
                          • Instruction Fuzzy Hash: 0D314D70E0020A9FDB08CFA5D180A9EBBF2FF89300F658155E905EB351D770EE858B40
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7660d23ce85baf56872fc33b2a7968fdcc0c5c92aa8732bf8e5e00364ca4b351
                          • Instruction ID: 0116c8b3b06be9c7e6c613fc6a77da0e14fec171ce5483f1077c9a1bb3de4841
                          • Opcode Fuzzy Hash: 7660d23ce85baf56872fc33b2a7968fdcc0c5c92aa8732bf8e5e00364ca4b351
                          • Instruction Fuzzy Hash: DF218C347003158FD31AAF78E59846E7BA6FB89305B904968E906C3388DF355A1ACB91
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234469149.000000000185D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0185D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_185d000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 624ac7750248249b763059666b00b0cc564aa3eb1122fccd472a9a5c2376d557
                          • Instruction ID: 1b0e43d1cec50f50d17d8e2d232dd04d5248ac6f1de0c7815934a68d0b3800da
                          • Opcode Fuzzy Hash: 624ac7750248249b763059666b00b0cc564aa3eb1122fccd472a9a5c2376d557
                          • Instruction Fuzzy Hash: F8213771104244DFDB51DF58D9C4B26BF65FB84364F24C669ED098B246C33AD507CBA2
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 923f94d9296aba500d551902a7be723d4b887909c717f835af2397f3ba2d3337
                          • Instruction ID: 32de183055c8dca7a0a748f5a0844550812ce6ab0ccf0a4c947d1001b49c0c4f
                          • Opcode Fuzzy Hash: 923f94d9296aba500d551902a7be723d4b887909c717f835af2397f3ba2d3337
                          • Instruction Fuzzy Hash: 2B219274E002198FCB40DFB8D84496EBBB6FF89301B508569E901EB355DB35AE05CF92
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e6828cc2b6f5da97a33c89643f8b052baadfd6bbd0fd55cdaf0b4ae1fa1601e6
                          • Instruction ID: a52cab90d45d0821a294f0119ba67c5829b36c86b829de4f5b2d56795491796f
                          • Opcode Fuzzy Hash: e6828cc2b6f5da97a33c89643f8b052baadfd6bbd0fd55cdaf0b4ae1fa1601e6
                          • Instruction Fuzzy Hash: 0A218C71D0034ADBDB15CFB5D55469EBB71FF86304F20452AE911EB245E7B09A4A8B80
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234469149.000000000185D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0185D000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_185d000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 69f5d59c5c4f4267f68426eaad669390129f6f562464b900323c3a6dd4a42013
                          • Instruction ID: 1b9e9951c539b01329e843164c8d1e1b6f2d9e71ba0b933d0ff056cb29ecece1
                          • Opcode Fuzzy Hash: 69f5d59c5c4f4267f68426eaad669390129f6f562464b900323c3a6dd4a42013
                          • Instruction Fuzzy Hash: 7221B0751093C08FDB03CF24D994B15BF71EB86314F2882EADC458B657C33A990ACB62
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 084bff77af3ee9d44c0cefd8b8ba02b754aeff926de581ad9fbe0c0da26b12ed
                          • Instruction ID: 805809c006a4c57925b6911f0789f0d95ce2bda85c646c92ac194bbd96e25b91
                          • Opcode Fuzzy Hash: 084bff77af3ee9d44c0cefd8b8ba02b754aeff926de581ad9fbe0c0da26b12ed
                          • Instruction Fuzzy Hash: 9C111CB4905208EFCB45DB98D5419ACFFB0EB4A324F2481EADC5897351C635AE46DF81
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 48213fdf0cf21d3b7992887c1f943c7db0e46a10c46f8b2ed047a73ea817dafb
                          • Instruction ID: ad8b85002c003274f39ee18be2d9bc9459f033a80bb634b2aadfd8c7dcc3ca23
                          • Opcode Fuzzy Hash: 48213fdf0cf21d3b7992887c1f943c7db0e46a10c46f8b2ed047a73ea817dafb
                          • Instruction Fuzzy Hash: C4114974E002099FCB44DFA8D9849AEBBB6FF88300B508569E901EB354DF75AE05CF91
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1ebc693042d60e63d467b4c56221e3ca718260db9e1f422063b4b349f40a5ff8
                          • Instruction ID: 2773fa398abea5b81162653071cc84c7808cf1eee0d402770a8a4aa48a040e65
                          • Opcode Fuzzy Hash: 1ebc693042d60e63d467b4c56221e3ca718260db9e1f422063b4b349f40a5ff8
                          • Instruction Fuzzy Hash: 2101F5307082159FE3118A79980873ABBA6FF89740FDC4466E916DB391DB718E02CB92
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 71bd5f46b65ad7cb2b8c76d091a077985781a30309e623706c7fb7683afa5aab
                          • Instruction ID: 48fd05243e337eab11ef720f5f50aa0831395b38b5640325503bccf280ade8ba
                          • Opcode Fuzzy Hash: 71bd5f46b65ad7cb2b8c76d091a077985781a30309e623706c7fb7683afa5aab
                          • Instruction Fuzzy Hash: BC111534A105088FEB14CFA8D458BAD7771EB48714F980065F553EB391CB34AA458B41
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 48249f54650faca27ba11f2f5a9605b5494adb0b16fcb824f2de4a3d276fd9f2
                          • Instruction ID: 1d3b553b0569688cf1aab4d857ccdd20a7606e63775b9647a2d276b2ff434213
                          • Opcode Fuzzy Hash: 48249f54650faca27ba11f2f5a9605b5494adb0b16fcb824f2de4a3d276fd9f2
                          • Instruction Fuzzy Hash: CD012630308B468BD72A972DE05063B7792EFC6700F54847DE04ACB1A5DE24BE81C345
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 800bf0c7cbab61027b65537af01899ce6d26bc2f28770f862bd188edd9e6222e
                          • Instruction ID: a1e2cfdc8ba108f1c9c0e8073051d8b478b6d7b18930585971f9dfe7f0aa651c
                          • Opcode Fuzzy Hash: 800bf0c7cbab61027b65537af01899ce6d26bc2f28770f862bd188edd9e6222e
                          • Instruction Fuzzy Hash: D801D6357081189FE3245A5DA848B2AB7E6FF88350FDC4426EA1ADB394DE719E01C792
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6bddbffee95aea9ccf70368a321440b3f82cd256de5f470c21752d33622e6da7
                          • Instruction ID: 502a6768dc20dc6e995a94893d1e8aeb1369c2787345889eaca8eebf556176a7
                          • Opcode Fuzzy Hash: 6bddbffee95aea9ccf70368a321440b3f82cd256de5f470c21752d33622e6da7
                          • Instruction Fuzzy Hash: 821182717002018FE745DB28D454B2A7BA2EF89704F64416CE806DF3A2DB3AED41CF80
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0be442050effd370318a360734a1e16a7c60cabf63bd40cae5cdfe891b7c2139
                          • Instruction ID: 7d1256cb10310fea34e745992bcd0d068e289ac1e0ae5ef19578489a4bd69141
                          • Opcode Fuzzy Hash: 0be442050effd370318a360734a1e16a7c60cabf63bd40cae5cdfe891b7c2139
                          • Instruction Fuzzy Hash: ED0139F1D15208DFCB44CBA8E5816ACFFB0EB4A311F1481AADC58A7351C639AA49DB81
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 94cc63637ab810d4f66244515df9d10f0cbc2285aa4b08d779e34a25ab78aebc
                          • Instruction ID: 6da0516b9dce45a727748fd230ee8a36af45ede11b8e5811797a7ab8153156cb
                          • Opcode Fuzzy Hash: 94cc63637ab810d4f66244515df9d10f0cbc2285aa4b08d779e34a25ab78aebc
                          • Instruction Fuzzy Hash: 3811B7B4E0021E9FCB44DFA9C8456BFFBF1FF88300F50856A9518A7354DA359A418F91
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4dbbc97c68742f24d6483cdd656472152f5f12162ddc57be5338f45543ca3a1a
                          • Instruction ID: 14e812535ada7c9dc3c621fd554b7becfc07a08d48366986269b211639b4d005
                          • Opcode Fuzzy Hash: 4dbbc97c68742f24d6483cdd656472152f5f12162ddc57be5338f45543ca3a1a
                          • Instruction Fuzzy Hash: 2A11F775904248AFCF06DF94D841AADBFB1EF49310F24C19AEC55A7262C2329A61EB91
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 848e35042a3810592782ee07375ff9928c94df6cae137e7ef0e609f146c39b96
                          • Instruction ID: b1c36f22aa1b08e685763b39e488c54d75531f176314047032f1d25066f25e0c
                          • Opcode Fuzzy Hash: 848e35042a3810592782ee07375ff9928c94df6cae137e7ef0e609f146c39b96
                          • Instruction Fuzzy Hash: E0012874B402058FE7158FA9C8A8B6DBBB2BF89304F580069E443DB3A1DBB49E01CB00
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 378f4a725b33e23898aae71acdbf44029d7e3fa5241eadd9c8a96217e37410f9
                          • Instruction ID: 0c5afa456aa787c79e0b9cc6d894779f415b33df9fe78986ca0f7345270c577b
                          • Opcode Fuzzy Hash: 378f4a725b33e23898aae71acdbf44029d7e3fa5241eadd9c8a96217e37410f9
                          • Instruction Fuzzy Hash: DA014B7180420A9BCF029FA8D8009EEFB75FF8A321F00855AE95467211D7369696DBA1
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0d7a275b286c16332f056097ddafcb46b8c7591fbabbeb165b071a5fbec3d106
                          • Instruction ID: 246fa58b905b960c875820f9823149c3b15fa7d298061b69a2ce2b88cdce703a
                          • Opcode Fuzzy Hash: 0d7a275b286c16332f056097ddafcb46b8c7591fbabbeb165b071a5fbec3d106
                          • Instruction Fuzzy Hash: EEF0B4F5A0A2099BCF05CA64A8415F8FB78FB03312F1451DADC6967242C631ED59C796
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4b48956d6be6647550b6c912528919203d091946c2d341bc521b74b4dda12714
                          • Instruction ID: 272c09c77fb588a043d8ed0df8b2ae15ecebe321f20d1c563959933c37b02431
                          • Opcode Fuzzy Hash: 4b48956d6be6647550b6c912528919203d091946c2d341bc521b74b4dda12714
                          • Instruction Fuzzy Hash: 1FF024313043900BC7267B7CB89806C7FA6EFC67127490499E586CB156CE290F0987A6
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d5c0cb5663ae6f8bdec5ebe559a5b79ac0e1863f0f1e08757f501f179baa94c9
                          • Instruction ID: e917246409aba4c17d1b08f20cb3cdcfce51a119aefe42a7098ef898d7582d63
                          • Opcode Fuzzy Hash: d5c0cb5663ae6f8bdec5ebe559a5b79ac0e1863f0f1e08757f501f179baa94c9
                          • Instruction Fuzzy Hash: E2F0B4B08092489FCB51CBB8E4516EDFFF4EB0A211F1081EBD848D7741D6355A84CB91
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 30f896eef6d12621cd120ff431e4971d6704a4131fa59aa821c9603c21b777f9
                          • Instruction ID: 8767485d31d1e2dfbc93c66aa0b9a68bfbc17ee760d8676873056bb5243caef5
                          • Opcode Fuzzy Hash: 30f896eef6d12621cd120ff431e4971d6704a4131fa59aa821c9603c21b777f9
                          • Instruction Fuzzy Hash: 4FF0C2B5804208AFCF02CF94D8405ECBFB5EF09310F14809AEC9457351C235AA55EF41
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 40d80045483f97d740836ec2c9d8d10c9b367335420e49e4416770abc6800841
                          • Instruction ID: eb3a5a6a1317e3d945491d7abbc89f0ecb2e2d7f3772a1905abbf4a3db2574b2
                          • Opcode Fuzzy Hash: 40d80045483f97d740836ec2c9d8d10c9b367335420e49e4416770abc6800841
                          • Instruction Fuzzy Hash: F4F0C47180020AABCF019F99D8019EEBB75FF89321F10C51AEA5927210D736A6A6DB90
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 924e33c52f56ccb73f93af399c0812e8f0c2a841ffc92fe643e354da5c159f21
                          • Instruction ID: bfb9761eccc682cf4dba1e39d5810eab74efb4c6ae1e553de203532b217ce373
                          • Opcode Fuzzy Hash: 924e33c52f56ccb73f93af399c0812e8f0c2a841ffc92fe643e354da5c159f21
                          • Instruction Fuzzy Hash: 7EF0907080424CAFCF02CF90C840AACFFB5EF46200F10819AEC5467256C6369A15DF91
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 525f099a65040bafa6d3c5c89f7c74497b96091575fef71fdef8177584af5b58
                          • Instruction ID: 0ba565554b8a864ebaa72f46d0473d8b6faab7cf70a35291cb13ec0a4f3a4849
                          • Opcode Fuzzy Hash: 525f099a65040bafa6d3c5c89f7c74497b96091575fef71fdef8177584af5b58
                          • Instruction Fuzzy Hash: 1BE0E571300210478769733DB49806D7E9AEFC47527800428E50AC7244DF381F498BA6
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7ef7337fe5697390e8e0d74cd7baf567510b368cc9c1f792856c888e1d17c94f
                          • Instruction ID: cc56c8a1740d5eac12ec60846e53b2d71b46dce3c0c6cc66081b142cd6227709
                          • Opcode Fuzzy Hash: 7ef7337fe5697390e8e0d74cd7baf567510b368cc9c1f792856c888e1d17c94f
                          • Instruction Fuzzy Hash: 7A014B7080061ECBCF25CF58C840BE9B7B1FF59300F008699E958A7610E775AAD5CF80
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1f6f05470175ed6d9cd2f1530ab9e8ff72a1f750d32018082f28f79d78a74298
                          • Instruction ID: f02fe405987e463c170c9f1baea8729aeb7a9f975ac3a53c349af870aeeeae5b
                          • Opcode Fuzzy Hash: 1f6f05470175ed6d9cd2f1530ab9e8ff72a1f750d32018082f28f79d78a74298
                          • Instruction Fuzzy Hash: 24F082F4909208AFCB45CB94D8809E8FFB5FB4A310F1480EADC5497351C635AB8ADF95
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9857fdaea37a619be2bbf5c473557bd5baf6bdcc2ed406bb71045617a35f218f
                          • Instruction ID: 264232e1356508e38b0becd493aac9a35b4b224d0d44daa059584ad5ae30dfea
                          • Opcode Fuzzy Hash: 9857fdaea37a619be2bbf5c473557bd5baf6bdcc2ed406bb71045617a35f218f
                          • Instruction Fuzzy Hash: 1AF09030108B415FC312EB28E44084ABFA6EFC5314744CE6DE4898B157DA716D498761
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 230991d18a6f7a00a9fc87c4ca8989cba9336529505b166d8d2d034df0db550f
                          • Instruction ID: bccff8cedf6d8e8b3f774980db66eda85b68af1a47762840751f7a5644a2bf57
                          • Opcode Fuzzy Hash: 230991d18a6f7a00a9fc87c4ca8989cba9336529505b166d8d2d034df0db550f
                          • Instruction Fuzzy Hash: 3F0114B494121ADFDB60CF18CD80FE8B7B1EB08315F5480E9D908A7280DB769E85DF10
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d6d3525b1a34764f6772455e93ef42bc752323168838d64a0e386d811df9f022
                          • Instruction ID: 27e74298b8a549e8b1de1b9e1e92d99cf87007ec24ea9adfce1d68db3f20bc91
                          • Opcode Fuzzy Hash: d6d3525b1a34764f6772455e93ef42bc752323168838d64a0e386d811df9f022
                          • Instruction Fuzzy Hash: 350114B494622ACFDF20CF24D958BE9B7B5EB0A355F4040E9C94DA2250E3388EC4CF11
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b8a93eb771b0d078a6afd99aa4f779d2939eb0cb98524d5e44310bbbfb79be82
                          • Instruction ID: f05575a6280ae7d2d297ce1eaabecd7519383957846bcc9f70d8c53bb66d6555
                          • Opcode Fuzzy Hash: b8a93eb771b0d078a6afd99aa4f779d2939eb0cb98524d5e44310bbbfb79be82
                          • Instruction Fuzzy Hash: 77F05EB0A092449FCF05CB64D4445E8FFB1AB4A310F1882EBD85467351C6355A45DF55
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1efdadb3f472ef0c88af5a0d32b66a169133d40c3f811f04507fde5885f4f38b
                          • Instruction ID: f6708bc9098a825d561ec5e5d839fb99ea64caae6324f74a61d839a39ca9e09d
                          • Opcode Fuzzy Hash: 1efdadb3f472ef0c88af5a0d32b66a169133d40c3f811f04507fde5885f4f38b
                          • Instruction Fuzzy Hash: 5EF0FEB4904208AFCB94DFA9C840AADBBF5AB49211F14C09AA868D7341D6359A51DF51
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c69f9368e618cbb5fe4a1b1f55b27e5893e8ebf9004510b423192db7229a97b1
                          • Instruction ID: 282d547dc35032ca853184bb27bc030e854ecf4e8ee94908b558fe38659912e7
                          • Opcode Fuzzy Hash: c69f9368e618cbb5fe4a1b1f55b27e5893e8ebf9004510b423192db7229a97b1
                          • Instruction Fuzzy Hash: BCE020E000F2865FEB0E86608805AD5BF6C8B132D9F4410D5C80517142D1711988C6E5
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b91b5a352b19ba1e0a89f20e55ac17efa07442e5dc814a7126895f303907bb53
                          • Instruction ID: 189a0d88ada1381d67d22e6c4eaa699831601f067ddaaf47a091b1d3e6a7bae4
                          • Opcode Fuzzy Hash: b91b5a352b19ba1e0a89f20e55ac17efa07442e5dc814a7126895f303907bb53
                          • Instruction Fuzzy Hash: 80F015B4904208EFCF45EF98D841AACBBB5FB48310F10C1A9EC1863360C732AA61EF51
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1686a32d00583f241caa29016255f0fd5d6654639da59f98d5e37cd8a6452a5d
                          • Instruction ID: 50bb3f9b3b0320604aac7d7a0c53697ce26ed11e4111d9aa32f2136b61606ef3
                          • Opcode Fuzzy Hash: 1686a32d00583f241caa29016255f0fd5d6654639da59f98d5e37cd8a6452a5d
                          • Instruction Fuzzy Hash: EBF015B4804208EFCF46CF94D8409ACBBB5FB49310F10C0AAEC9462351D736AA61EF41
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1a7d32f562915e0fb189ac34b2204e8bb429776fa0eaa93a75fc3fd79591aa16
                          • Instruction ID: f485fd8a94fad516654497b70079545f5b1201da2d71b5793dae06e83ee87160
                          • Opcode Fuzzy Hash: 1a7d32f562915e0fb189ac34b2204e8bb429776fa0eaa93a75fc3fd79591aa16
                          • Instruction Fuzzy Hash: 4EE0EDB4D05208EFCB84DFA9D441A9CFBF4EB49310F10C1AA9819A3354D635AA51DF51
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1a7d32f562915e0fb189ac34b2204e8bb429776fa0eaa93a75fc3fd79591aa16
                          • Instruction ID: cbc7e8173119f17df2bec91a208262496bfd2c35f74eaf494c5bb0e66499a10c
                          • Opcode Fuzzy Hash: 1a7d32f562915e0fb189ac34b2204e8bb429776fa0eaa93a75fc3fd79591aa16
                          • Instruction Fuzzy Hash: 21E0EDB4D05208EFCB84EFA8D441A9DFBF4EF49310F10C1AA9818A3340D7359A51DF41
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1a7d32f562915e0fb189ac34b2204e8bb429776fa0eaa93a75fc3fd79591aa16
                          • Instruction ID: 348b863f8cf86ea0aaee9b42e701abede66ccfcb031a080192b6319662630846
                          • Opcode Fuzzy Hash: 1a7d32f562915e0fb189ac34b2204e8bb429776fa0eaa93a75fc3fd79591aa16
                          • Instruction Fuzzy Hash: 91E06DB4D44208EFCB84DFA8D840A9CFBF4EB48300F10C1AA9828A3300D6359E41DF50
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2e31e254147d710470c3b49ad5c074160a95a6292cbc477c125fefef6917594c
                          • Instruction ID: c45a44f4f14aa2675f78b4c2263f05d8d52b576a88299386452ce66003f3de87
                          • Opcode Fuzzy Hash: 2e31e254147d710470c3b49ad5c074160a95a6292cbc477c125fefef6917594c
                          • Instruction Fuzzy Hash: 6FF0A4B4941229CFDB20CF24D948BE9B7B1AB0A355F4040E5D949A7250E3399E84CF51
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c4225175fdf8935332095229c744a90606b8baf96a8f7752234202403c56172a
                          • Instruction ID: 4e3a9798d9e251656fec365abe785b722a008295a5927d86316c2f6b32f8b350
                          • Opcode Fuzzy Hash: c4225175fdf8935332095229c744a90606b8baf96a8f7752234202403c56172a
                          • Instruction Fuzzy Hash: 65F0397480420CEFCB45CF94C840AACFBB5EF49310F10C1AAEC5452350C7369A51EF80
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 411b8250aef0ff5f0180ca7c60087a992fe9d3b9f144f2fbc7393e8aed054f21
                          • Instruction ID: b5578a3e19e4f06fef713feaab1f507182e0b7e3ff3c5413d384bb1b92681277
                          • Opcode Fuzzy Hash: 411b8250aef0ff5f0180ca7c60087a992fe9d3b9f144f2fbc7393e8aed054f21
                          • Instruction Fuzzy Hash: DFE086B4909208EFC744EF94D8419BDBFB8EB46311F10C1AAD85457341C7719A81DB95
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 15c824d974c0216f0e88d699243bc08ed3f527d57ad2342b53927742995f9588
                          • Instruction ID: 858941aaedbb4a7c2d9b82bb6da75128553528614c2a67670cc9b0cfb0813fb6
                          • Opcode Fuzzy Hash: 15c824d974c0216f0e88d699243bc08ed3f527d57ad2342b53927742995f9588
                          • Instruction Fuzzy Hash: 76E01AB4D05208EFCB44DF98D441AACFFB4EB49310F10C1AADC54A3341C635AA56EF85
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 15c824d974c0216f0e88d699243bc08ed3f527d57ad2342b53927742995f9588
                          • Instruction ID: c5d8e86656aae1d6874e49c56362deb768e12270d84cf8e5ce66fdc0236411d2
                          • Opcode Fuzzy Hash: 15c824d974c0216f0e88d699243bc08ed3f527d57ad2342b53927742995f9588
                          • Instruction Fuzzy Hash: C1E01AB4D05208EFCB44DFA9D441AACFBB4EB49310F14C1AADC5463341CA35AA55DF85
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 250c35f747efdc44b3200b80427fcb534843e30aa4310c9e70ebad5cea87c9d6
                          • Instruction ID: 80c15aed3baf34b963b2b521fe3be078ab504f605672d678a45e1d9b45e43f44
                          • Opcode Fuzzy Hash: 250c35f747efdc44b3200b80427fcb534843e30aa4310c9e70ebad5cea87c9d6
                          • Instruction Fuzzy Hash: 76E01AB4D49208ABC788DFA8D4416ACBBB4EB49250F2081AA985957341D6355A41DF81
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f3d4d41b609ad0868060cd7893ba8a558454811a2f55f03efbce4394c43b4a04
                          • Instruction ID: a4d5de32a63d307ae08f1cefc15c16ca4f4dab1f360c8a07829088969f824b88
                          • Opcode Fuzzy Hash: f3d4d41b609ad0868060cd7893ba8a558454811a2f55f03efbce4394c43b4a04
                          • Instruction Fuzzy Hash: BEF0A5749122299FCF29DFA4DE55BDDBBB2BF48700F1010999509B7290DA342E80CF05
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f3c92f17eb3b7b9efde849c20a22cd945a005618d14675104c7b8f43f0f38c2d
                          • Instruction ID: c6c582687c0d2dba14df29daadde037d86f1132787cf8530988ae9c73b6f0b27
                          • Opcode Fuzzy Hash: f3c92f17eb3b7b9efde849c20a22cd945a005618d14675104c7b8f43f0f38c2d
                          • Instruction Fuzzy Hash: 0CE01AB4D05208EBCB44DFD8D441AACFBB4EB89310F2081A99C1893340CB31AA45CF41
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 897b855d9e13705a20669143a1b5ec695c888f2ae4bd8ca8c2f5aa64b24e23b0
                          • Instruction ID: a9780818779c14746c0b9f1bf3004732d82bae89433126f33eb8161ed1d864c9
                          • Opcode Fuzzy Hash: 897b855d9e13705a20669143a1b5ec695c888f2ae4bd8ca8c2f5aa64b24e23b0
                          • Instruction Fuzzy Hash: 62E0ECB0955208DFCBD8EFA8D8456ACBBB8AB05211F1041A99908A3250E7345A84CF41
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3f425b95eb06af5f800f98cbfc01754bbcc4dbbe8cb969d486678388fc84856d
                          • Instruction ID: d67661429a4d645d18a36adb27ddd6ba4cd725a84c9fde23148c5e59caa84ab1
                          • Opcode Fuzzy Hash: 3f425b95eb06af5f800f98cbfc01754bbcc4dbbe8cb969d486678388fc84856d
                          • Instruction Fuzzy Hash: 30E0C2B4A09208DBC744EF94D4419ACBBB4FB46304F20D1FAC81827341C7315E42CFA1
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d4defa537698f13a1e28e3d9ba351494fc9aa86b1e90f0afefa6a472493e10e2
                          • Instruction ID: 2029254199439b0bef1de1f767e0dcabeff5830fd4c874785446290539045690
                          • Opcode Fuzzy Hash: d4defa537698f13a1e28e3d9ba351494fc9aa86b1e90f0afefa6a472493e10e2
                          • Instruction Fuzzy Hash: 16F0A5B484622ACFDB648F24DA48BE9B7B0AB05355F8001E9D90DE3650E3398EC4DF11
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7bb4c4375b0b4e5a642c94c60f110126ceacdf20c10a96125db9c25509448ca7
                          • Instruction ID: 32b735f0b0d48089e71eb7a85f3519c1520b1c40ffe1915540ca19a8c11f3d1f
                          • Opcode Fuzzy Hash: 7bb4c4375b0b4e5a642c94c60f110126ceacdf20c10a96125db9c25509448ca7
                          • Instruction Fuzzy Hash: 04E0C2B4909208DBCB04DFA4E4419ACFBB4FB46301F2081A9DC0923340C631AE46CF81
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b5b9dfd25effb8ce8415463d30e3274359c991ae08ad0f5733384516e8e9f810
                          • Instruction ID: 8be85e74fc78ad83ec5ca81dbc429164e20f3864171b73bbd494aa455df04d6d
                          • Opcode Fuzzy Hash: b5b9dfd25effb8ce8415463d30e3274359c991ae08ad0f5733384516e8e9f810
                          • Instruction Fuzzy Hash: 28E012B4D192088F8B80DFB85405299BFB0EB08604B0045A5D859EB305F7714A168FD2
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6878549ccb781276b0c28667f50d2053ca7a81a2dbc053949e209988da725650
                          • Instruction ID: e523d84d0bed235032abdc7b23bba08f1e89b74327c310415bbd85e8d0244074
                          • Opcode Fuzzy Hash: 6878549ccb781276b0c28667f50d2053ca7a81a2dbc053949e209988da725650
                          • Instruction Fuzzy Hash: 92E0C2706442079FE709CF61D669B2EBFB1AF00708F64454AE601DF692D7B4CA84CF80
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: eaccfe81b24df1bed6668f4d4b5b6fbaf4167367a23251cdb5333261202f2f57
                          • Instruction ID: b355a1ea50ebf20b594e054c0a7906da21d9f2e46aa6cc472c0e8f7b511f8a3b
                          • Opcode Fuzzy Hash: eaccfe81b24df1bed6668f4d4b5b6fbaf4167367a23251cdb5333261202f2f57
                          • Instruction Fuzzy Hash: 0FD022F048B20EEBCB48CAA8D401FA9BF7CDB03204F0020A88C0823300CA700E48CA89
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2120678fc06a5ddb2c46543269988675d91768264194500081dc1d9d3c7ef34a
                          • Instruction ID: eac3790d3411b52e5afe77f7b6906459294a83fbe0c20fb251a60ea0c84052a5
                          • Opcode Fuzzy Hash: 2120678fc06a5ddb2c46543269988675d91768264194500081dc1d9d3c7ef34a
                          • Instruction Fuzzy Hash: 67E0BDB4912218ABCF21CFA0EA14B9DBBB2AB08700F101095AA09A6290D2785A808F01
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 78951dfd03ba284a7d57651df0aa16cfed517a9ca3c02e97ae1daccf16ee66c9
                          • Instruction ID: eac3790d3411b52e5afe77f7b6906459294a83fbe0c20fb251a60ea0c84052a5
                          • Opcode Fuzzy Hash: 78951dfd03ba284a7d57651df0aa16cfed517a9ca3c02e97ae1daccf16ee66c9
                          • Instruction Fuzzy Hash: 67E0BDB4912218ABCF21CFA0EA14B9DBBB2AB08700F101095AA09A6290D2785A808F01
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d089cb550c59ef8a1f3f244e97781c90ec8ae6a8fe79b52eb77895a628b3ea50
                          • Instruction ID: 07d33a082a67d9cbfa0c62b658df4f1249870aa80ee8105d4a6bf33b426e1742
                          • Opcode Fuzzy Hash: d089cb550c59ef8a1f3f244e97781c90ec8ae6a8fe79b52eb77895a628b3ea50
                          • Instruction Fuzzy Hash: 47C0123000A785CFDB121B24A868321BF78EE0721039014DBE888C9866DB2828109B63
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 97c3fe1cec5bb738846c63cb265b6302ba17e5170bbbbaa912e6cb81a7eb3fea
                          • Instruction ID: 622a6802d6160e09d7b50207c35b24cbf17b0b92119f4d0e63fd638b4e48c150
                          • Opcode Fuzzy Hash: 97c3fe1cec5bb738846c63cb265b6302ba17e5170bbbbaa912e6cb81a7eb3fea
                          • Instruction Fuzzy Hash: 7BD0C9B0D0530C9F8B80EFB9A40526EBBF4FB08204F4045AAD80AE3204FB7446108FD1
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296209966.0000000007770000.00000040.00000800.00020000.00000000.sdmp, Offset: 07770000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7770000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a5875fe503c68dbe926a8249c0e53ef6845ad0a9f91d6aa5c7ba2e9552aecfa6
                          • Instruction ID: d7ccc41ad07d607404101b2f2d5f533d8be18ce1879f2ef4e609d28606f3aa8a
                          • Opcode Fuzzy Hash: a5875fe503c68dbe926a8249c0e53ef6845ad0a9f91d6aa5c7ba2e9552aecfa6
                          • Instruction Fuzzy Hash: 3AC08CB00CA20583C2A67684A04E7B132AC9707242F00AC52930C4001246684080CAF6
                          Memory Dump Source
                          • Source File: 00000005.00000002.3296482377.0000000007D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07D50000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_7d50000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b8e5684ab4f7fbe9938edc856b641fec88a741986307e394620a4aa7086c4442
                          • Instruction ID: 2444bff878c0b5af56f084145d170f3c4ebe312d53f2cb46fdfacd4565c56698
                          • Opcode Fuzzy Hash: b8e5684ab4f7fbe9938edc856b641fec88a741986307e394620a4aa7086c4442
                          • Instruction Fuzzy Hash: 9CD0C9F9C0A39A8BCF21CF7099107D9BBF0AB1A355F2051D6CD5CA7291E6740A45CF41
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 28d789df666c8f30487fde1887633d574bdcfbb5a60242f476fa02ae8c3409c4
                          • Instruction ID: 84f8340797385af1b6a66c430f6ed4d3c97edd22ed1465d3ae77ff04c3ba634e
                          • Opcode Fuzzy Hash: 28d789df666c8f30487fde1887633d574bdcfbb5a60242f476fa02ae8c3409c4
                          • Instruction Fuzzy Hash: 10B012A014D10CCBA9284A5434040343710D75170E7800282B80BD84086D0106604A53
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b917ac68e07665fc7b75e21c1e121b0d097ac182bd1eb9afda333c49456e2f0f
                          • Instruction ID: 26e219a22ebfa185d4b170aabdbaa0b41aa77c32e349703c0debf28a8b0aedf0
                          • Opcode Fuzzy Hash: b917ac68e07665fc7b75e21c1e121b0d097ac182bd1eb9afda333c49456e2f0f
                          • Instruction Fuzzy Hash: 9790023104870D8B579127A57509555775DD5445157800051A50D419056A5965505A99
                          Memory Dump Source
                          • Source File: 00000005.00000002.3267106503.0000000005900000.00000040.00000800.00020000.00000000.sdmp, Offset: 05900000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_5900000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bd6ae2716ffef59802d491962748cfcb59a3adde64afbf49ca04a5f8df9bb117
                          • Instruction ID: 9b92dfac732f930d2f3a0e722c78328cf853ead8742cf883be4aec7dd940eb2f
                          • Opcode Fuzzy Hash: bd6ae2716ffef59802d491962748cfcb59a3adde64afbf49ca04a5f8df9bb117
                          • Instruction Fuzzy Hash: 874102B4D043489FDB24CFA9D984BADBBF5FB09300F249429E815BB294D7749984CF85
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 0c5b3085588488e16073510f08496a41aa8f314a05b6de47c72c3cfa8de45161
                          • Instruction ID: e1001b1fa7e511a4e50ed27d2d09f4e31d74d77b8a55d3e4606dc00ee97af81d
                          • Opcode Fuzzy Hash: 0c5b3085588488e16073510f08496a41aa8f314a05b6de47c72c3cfa8de45161
                          • Instruction Fuzzy Hash: 6AC08C0000E2888FFE070E2800D02306D047F53214B4CD4DAC8428B007C298C686A321
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: f5ca1234b05d0f57f81c3ac201015905abd7c33b8f5ff7a5f8d64117c6f53b73
                          • Instruction ID: 69ebccb08931334786cbc9950196467a81a57cfdbf4680e3a190914bb52da74c
                          • Opcode Fuzzy Hash: f5ca1234b05d0f57f81c3ac201015905abd7c33b8f5ff7a5f8d64117c6f53b73
                          • Instruction Fuzzy Hash: FEC08C2040E284AFAE030E6800810346D107F1322434DC8DAC8428A007C15886859329
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 4cd317eb249ea2675cbfda6876cdf9e4f7a42f777a45047556d4e9aa1d1a6012
                          • Instruction ID: 48380b1ca24a69017238a014c76ca347dd323708b67906987984614565854cc0
                          • Opcode Fuzzy Hash: 4cd317eb249ea2675cbfda6876cdf9e4f7a42f777a45047556d4e9aa1d1a6012
                          • Instruction Fuzzy Hash: FEB01130208000CBEA028E0088802203220BF83308B3880AAC80B8B20AC320C88ACA02
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.3234691321.00000000018A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 018A0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_18a0000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 823ed2d2df556360fd5e084fec3c2391a191aba04b4eb5bfb00d3a94b3d459a9
                          • Instruction ID: 684dc030fb23bfdba21e6abad810ff9dfcf46fe7d1064f06cda97ee3250a5b8b
                          • Opcode Fuzzy Hash: 823ed2d2df556360fd5e084fec3c2391a191aba04b4eb5bfb00d3a94b3d459a9
                          • Instruction Fuzzy Hash: DAB012B1807380CFC7048E008185740BFD0BF40209F17C0DDC1000F053923DC10BC600
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: Djq
                          • API String ID: 0-3204991199
                          • Opcode ID: ef152d405509cbf237cc0da9f0de87eb4eb12a2e9faf5443764c658a3919e32a
                          • Instruction ID: 6e9bb5fe413e449ef3c0b68fbdac8d4770dde598eb0e047245723ad07099796a
                          • Opcode Fuzzy Hash: ef152d405509cbf237cc0da9f0de87eb4eb12a2e9faf5443764c658a3919e32a
                          • Instruction Fuzzy Hash: 91D1EF74E10219CFDB54DFA9D990A9DBBB2FF89300F6081A9D409AB365DB31AD81CF50
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7839aece33338342818fcb62e8ce7a756a83c7121a4eec9667f49377b1b630c9
                          • Instruction ID: e9eb1040c3cff961d7dfc3301c9e3c329828a73dd1d7290ce5e79fa9a58e7f44
                          • Opcode Fuzzy Hash: 7839aece33338342818fcb62e8ce7a756a83c7121a4eec9667f49377b1b630c9
                          • Instruction Fuzzy Hash: 5A515A78A11209CFDB94DF69D894BA9B7F2FB89300F1081AAD50AA7350DB349D81CF11
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: d%iq$d%iq$$cq$$cq
                          • API String ID: 0-476168907
                          • Opcode ID: 8ec02b3ffb21d11a12aff518485008915b7518e161437c36ad0ca4dbd3003361
                          • Instruction ID: 6e2681b53064844832e73c159699828f7c5418b0214a5328b91e0563812d0c17
                          • Opcode Fuzzy Hash: 8ec02b3ffb21d11a12aff518485008915b7518e161437c36ad0ca4dbd3003361
                          • Instruction Fuzzy Hash: D861E571B042048FDB159E78C851B6B7FA2ABCB320F6185EBD406DB3D6DA31DC828791
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 497e53d8b072ed05000b51e67762d9282e093caa1d91826be2f315fb1b9acba1
                          • Instruction ID: 79af224dc59110493d937405095f52daa2ad1daf661e80589cd99e242d817d3e
                          • Opcode Fuzzy Hash: 497e53d8b072ed05000b51e67762d9282e093caa1d91826be2f315fb1b9acba1
                          • Instruction Fuzzy Hash: 43C0023550E6808FDF138E2985D02397E256F53210315D5D6D8460F55BC2289587D766
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: Tecq$Tecq
                          • API String ID: 0-2088518435
                          • Opcode ID: 836a35287cee36a8f5b665d647b5a0eab784575118a7c17b9965e28d9b19f053
                          • Instruction ID: 02d8e9da1651247472977ca6777bcbce9c69c7e3eca5d3d5be50e207dcafd6af
                          • Opcode Fuzzy Hash: 836a35287cee36a8f5b665d647b5a0eab784575118a7c17b9965e28d9b19f053
                          • Instruction Fuzzy Hash: F3316E70B001049FCB46EFB9C554AAEBBE3AF89310F65446DD406BB3A5CE709D01CB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: Tecq$Tecq
                          • API String ID: 0-2088518435
                          • Opcode ID: 0d781a3d66b409e170d05e1fa88ff7817a48c03f9a454f63f11cc6b492105c5a
                          • Instruction ID: 009b840570ec7db993d65f4458006c09f0ffb34e5c1dc828f3b564f4876a46f6
                          • Opcode Fuzzy Hash: 0d781a3d66b409e170d05e1fa88ff7817a48c03f9a454f63f11cc6b492105c5a
                          • Instruction Fuzzy Hash: 31316F70B001059FCF49EFB9D554AAEBAE7AF88310FA1446EE406BB395CE759D01CB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: &$A
                          • API String ID: 0-867333088
                          • Opcode ID: 923ce1d553b3e13d4f03fe87f016892bd4a74bb82b17a046cebc8f536e133c6c
                          • Instruction ID: 0e59f3b8f63b1987730bae016eab8347403ee6da0ec712b2278f413e53c8bcdb
                          • Opcode Fuzzy Hash: 923ce1d553b3e13d4f03fe87f016892bd4a74bb82b17a046cebc8f536e133c6c
                          • Instruction Fuzzy Hash: 2601FBB585125ACFDB249F50DD1CFEDB7B1BB48305F0040E5D50966290E7798AD4DF00
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: '$A
                          • API String ID: 0-846207447
                          • Opcode ID: 85f586ffd830f92c15713f2de12d2f78a2bb65136383cc08fe721a62fceb7daa
                          • Instruction ID: f35af7ddac84205eecd618c3b0ee3c8a80d2a92a79f043c85c0d9461352e2b81
                          • Opcode Fuzzy Hash: 85f586ffd830f92c15713f2de12d2f78a2bb65136383cc08fe721a62fceb7daa
                          • Instruction Fuzzy Hash: 3AF0F8B4919329CFDB64CF64CD58BE8BBB0AB48304F1081D9890DAB380D7789AC6DF04
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: Tecq
                          • API String ID: 0-1122318316
                          • Opcode ID: 0b7f0fb567c711b5b65366cd6f2078812dfcecd8bed1583d185d047444992e0f
                          • Instruction ID: 9f587ecdc0df6b55cd00134a1aac276af331e88d3a78cf4d9882d654e9527d03
                          • Opcode Fuzzy Hash: 0b7f0fb567c711b5b65366cd6f2078812dfcecd8bed1583d185d047444992e0f
                          • Instruction Fuzzy Hash: 1F312774B00115CFDB14DFA9D898BADBBB2BF88315F15446AE80BDB3A1CB709842CB40
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq
                          • API String ID: 0-182294849
                          • Opcode ID: 8558f6ecd6dbdce0c4a86e3dd66b6ed13bd5623685739e89863eeab2cdca44c1
                          • Instruction ID: 6cdba4e1a51aa252f219410553e02f2926934c08535088e18e3f9a1244621e81
                          • Opcode Fuzzy Hash: 8558f6ecd6dbdce0c4a86e3dd66b6ed13bd5623685739e89863eeab2cdca44c1
                          • Instruction Fuzzy Hash: D0116071E0550A8FEF49DFA9C8405FEB7F9FF88300F209529C515A3251DB349904CBA0
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: /
                          • API String ID: 0-2043925204
                          • Opcode ID: d2ab198a19da1ac0eac2a421954e8b28fa0e4e26c6d4ae22df31a23c6f923881
                          • Instruction ID: 55e49d56865cd8391f743c2f492a8f637456f16d1312903d8cead562b60f2cad
                          • Opcode Fuzzy Hash: d2ab198a19da1ac0eac2a421954e8b28fa0e4e26c6d4ae22df31a23c6f923881
                          • Instruction Fuzzy Hash: 4201AFB495222ACFEB69DF18D858FA9B7B1BB49301F4045EAD409A7390DB319E84DF00
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: "
                          • API String ID: 0-123907689
                          • Opcode ID: 7f4830955131c0346905bf6ff5fd670041364875a6c6535addab46b8bb6687d4
                          • Instruction ID: 21fe054fff03f82977ded212a6ae404bb0e2fd038521ffedb2602350944a1ebe
                          • Opcode Fuzzy Hash: 7f4830955131c0346905bf6ff5fd670041364875a6c6535addab46b8bb6687d4
                          • Instruction Fuzzy Hash: C301F2B994122ACFCB24CF14C988FE9B7B1AB08301F1080E5E509A7290D3749E85DF00
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: /
                          • API String ID: 0-2043925204
                          • Opcode ID: fa8e0bc641828fdf70056f26bc84d5e7fa261dccdbdb0a9e32f1f1fb4ef8def4
                          • Instruction ID: 5ff0a4d5d21b8a5995514d5ebcb1079e03d5e505cc05f3e2eaf73d07a6c1fcea
                          • Opcode Fuzzy Hash: fa8e0bc641828fdf70056f26bc84d5e7fa261dccdbdb0a9e32f1f1fb4ef8def4
                          • Instruction Fuzzy Hash: 2A0192B495221ACFEB28CF14D958FA9B7F1BB09301F4141EAC90DA3690E3749E94DF40
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: 7
                          • API String ID: 0-1790921346
                          • Opcode ID: dd6017479acb59370b25bc39fb49423dfe3f1950d8571bab5f443dd1ea5b03bd
                          • Instruction ID: 1ad09576d2377b0ba1342f70761d0e7abd2dae2bd436315656539b909858a0ce
                          • Opcode Fuzzy Hash: dd6017479acb59370b25bc39fb49423dfe3f1950d8571bab5f443dd1ea5b03bd
                          • Instruction Fuzzy Hash: 04F0AFB19522299BCF29DF50DE68BADBBB2AF49300F001099E20966290DB706A84DF05
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: 8
                          • API String ID: 0-4194326291
                          • Opcode ID: dceba5f0c4aaa926961c3f4a2b205f42a7fb5191f813e35dd4fc19af37e5167b
                          • Instruction ID: fe113f031df903e9eec1840be200f045ac60080f482986d1b8b7b994ba3cde26
                          • Opcode Fuzzy Hash: dceba5f0c4aaa926961c3f4a2b205f42a7fb5191f813e35dd4fc19af37e5167b
                          • Instruction Fuzzy Hash: D9F0A4B485221ACFDB64CF14D998FECBBB1BB09315F5041E9D409A3690E7759AC4DF40
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: A
                          • API String ID: 0-3554254475
                          • Opcode ID: 62a3aa0324330fd62bab77eeedc6eec75e6ae45e6d2c9357c700df7dc41605e6
                          • Instruction ID: e3fddb9dbbab965600b0e38cc3cd4dcfbd5f0986af70f94df2a15226f5e174f5
                          • Opcode Fuzzy Hash: 62a3aa0324330fd62bab77eeedc6eec75e6ae45e6d2c9357c700df7dc41605e6
                          • Instruction Fuzzy Hash: EBF0D47291126ADFCF29AF60DD18BDDBB72AB49301F104499950A66290CB740AC8DF50
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: A
                          • API String ID: 0-3554254475
                          • Opcode ID: 6d5b176495e3c00e688141ebe17044fff8dafbd4fd0afaf395d7cc4ae3c75900
                          • Instruction ID: e4e854b6df3b91d36ce995ccdbdd3833607c036f38c2351d6dab40a51ada7a16
                          • Opcode Fuzzy Hash: 6d5b176495e3c00e688141ebe17044fff8dafbd4fd0afaf395d7cc4ae3c75900
                          • Instruction Fuzzy Hash: 04F0C9B585522ADFDF299F50CD1CBEDBB71BB18305F1040D5D50966290D7784AD8EF10
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: !
                          • API String ID: 0-2657877971
                          • Opcode ID: 56675fcf2e70e2ac8a1fd3d128889586593b4c8597283ac269f77e60cda98829
                          • Instruction ID: 0f39b03a8aafdf926351c974d1ba44ee148eb39190decd1013fccaa9f6236b62
                          • Opcode Fuzzy Hash: 56675fcf2e70e2ac8a1fd3d128889586593b4c8597283ac269f77e60cda98829
                          • Instruction Fuzzy Hash: B1F09BB894122ACFCBA4DF58D888BA9B7B1BB09311F5080E9D409A3781E7759EC4DF01
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fac1fc5f48fa006145436fe8bff8062b59e214ed2fc9e4939d09236716e9c64b
                          • Instruction ID: c1292e1de139c3c524ef3ddbcb080997ba0d920532046778d97917dccd98b17c
                          • Opcode Fuzzy Hash: fac1fc5f48fa006145436fe8bff8062b59e214ed2fc9e4939d09236716e9c64b
                          • Instruction Fuzzy Hash: 7C4216B8905600DFD721DF08E588A99BBF2FB04319F65D09AD4156F36AC3B6D889CF50
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9746a57fa1beb04fb18bdf29746deabe6297021a7cb0889f10632cc681a98aba
                          • Instruction ID: 54a0b56e088cff946b7a551d86bb048dff64456c27b95225bb9a438cbc2972ec
                          • Opcode Fuzzy Hash: 9746a57fa1beb04fb18bdf29746deabe6297021a7cb0889f10632cc681a98aba
                          • Instruction Fuzzy Hash: 2C3225B8905640DFD721DF08E588A96BBF1FB04319F66D09AD4156F3AAC3B6D888DF10
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9e22d8e3bccd498b81c91a341a033ba9b306ee39fec7f79d5189a5c165202c0e
                          • Instruction ID: 14d89e3ed94e066617bafacb25a9c1762887be204de39324dfc1ddf222d6091a
                          • Opcode Fuzzy Hash: 9e22d8e3bccd498b81c91a341a033ba9b306ee39fec7f79d5189a5c165202c0e
                          • Instruction Fuzzy Hash: 0EA1AD34A04645AFDF14CF69C480BAABBF5FF48310F14856BE84A8B791D7B4E982CB50
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4657f3232f808693050794bbd85264e8afbabf85f4054e24bdaa04bc9da43a8d
                          • Instruction ID: ea709b75fb5e608af5c8cd30bca1ec35ca747b401bd322e66383089f10d2d352
                          • Opcode Fuzzy Hash: 4657f3232f808693050794bbd85264e8afbabf85f4054e24bdaa04bc9da43a8d
                          • Instruction Fuzzy Hash: 0B811775E002188FDB54DF68C48499EBBF6FF48715B1684AAE806DB361DB30ED41CBA0
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e0b32231db3973e34b06293992a510f1ef24acf882f65c863c2dd950ff1e9cd5
                          • Instruction ID: 648820152e449d629817aa711ca6165c4946b074546f7eeb9e33ff3f8744dfab
                          • Opcode Fuzzy Hash: e0b32231db3973e34b06293992a510f1ef24acf882f65c863c2dd950ff1e9cd5
                          • Instruction Fuzzy Hash: AD717131A04109AFDF15CFA8D990BEEBBB1FF44304F158556E805AB352D7B1EA86CB90
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bbb0629ff7264d9bc2c0dbaf3ecc1c1588ea2546c4bc8a024b5be2ae8008dd6e
                          • Instruction ID: 19855f73851c7ebfaa0f7ba82b1a77778d92ea871b9b9ac516ab48de8b2f725d
                          • Opcode Fuzzy Hash: bbb0629ff7264d9bc2c0dbaf3ecc1c1588ea2546c4bc8a024b5be2ae8008dd6e
                          • Instruction Fuzzy Hash: 5E419431E042059FDF01DFA8C9906AEBFB1FF85300F15856BD90AA7252D7B09986CB51
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fc7fbda318b56d59e651dd24d1412b9cd55db95354f1fa90f749c3cd0ec71e80
                          • Instruction ID: bd3e5dd2227f87d2d644eafc62afe5b10afb302885399591741786cd51820434
                          • Opcode Fuzzy Hash: fc7fbda318b56d59e651dd24d1412b9cd55db95354f1fa90f749c3cd0ec71e80
                          • Instruction Fuzzy Hash: 5B512D35A04605EFCF14CF69C984AAABBF5FF48310F10896BE84A97761D370E985CB91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 44c068c45bb9f4d9f25f106edc1eb4a580cd41f229dfe4817f0317a336406980
                          • Instruction ID: bd97d6766dade9d710c9e0f307c7cf688918b0ca97ae2efbb9c115a73ac6444f
                          • Opcode Fuzzy Hash: 44c068c45bb9f4d9f25f106edc1eb4a580cd41f229dfe4817f0317a336406980
                          • Instruction Fuzzy Hash: 57419F35F1060B8FDF48EB65D4546AF7BA3FBC5300B24896AD50E8B298DF318982C791
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a223e72217623ed47481817bfc2860e2a81cee69cc0dbbb10756a72ced910ca7
                          • Instruction ID: 8c98956c4e0e0eee106e3313548012400cd93a610abfed710402acfb6d3ba4ec
                          • Opcode Fuzzy Hash: a223e72217623ed47481817bfc2860e2a81cee69cc0dbbb10756a72ced910ca7
                          • Instruction Fuzzy Hash: 5C318F71E052098FDF09CFA9D550A9EBFB6FF85300F65456AE805AB341DB70AC45CB80
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ed72b1204292ee99bcbfb371303c9985b39638c60c1b63b0f01a9bebd80002cd
                          • Instruction ID: 4e8ae82e7daa51297281edfe7e9ed7a1e93573c403cef31985c501fb67139760
                          • Opcode Fuzzy Hash: ed72b1204292ee99bcbfb371303c9985b39638c60c1b63b0f01a9bebd80002cd
                          • Instruction Fuzzy Hash: 035129B5D14669DFDBA1CF28CD84BD9BBF5BB49300F1081EAA90DA7340E7319A849F40
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3441225f881790ea475d9a4667ba59141f761dd696820be8606e7044ed77eaba
                          • Instruction ID: ae94638d920410631d658b75385d2e31447292c179ea2c7cdbf1e585c7e71779
                          • Opcode Fuzzy Hash: 3441225f881790ea475d9a4667ba59141f761dd696820be8606e7044ed77eaba
                          • Instruction Fuzzy Hash: C141EFB4D1522DDFEB24CF69C848BD9FBB5BB4A300F0192DAE409A7284D3749A94DF10
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b021204e73bd848e41f03dc1cc11ae4ad693541eda6949803b2aba9218ed322f
                          • Instruction ID: dd10e7e53e01ed08968ab7d217c290f0a06a65e4e7994b7499d34dbbee8bbd41
                          • Opcode Fuzzy Hash: b021204e73bd848e41f03dc1cc11ae4ad693541eda6949803b2aba9218ed322f
                          • Instruction Fuzzy Hash: 05318138B046078FDF18DB74D5546BB3FB2EB86240B1885ABC40E87299D7318843C792
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 45d2308c507f6e03a7f950c2833a33502596899b0e2fd290035f13b5db695e28
                          • Instruction ID: 15f8b73abc728ce09df200637bf15595c78a672543d05287ce8936d1c9c77cb1
                          • Opcode Fuzzy Hash: 45d2308c507f6e03a7f950c2833a33502596899b0e2fd290035f13b5db695e28
                          • Instruction Fuzzy Hash: C8315270E052458FDB19CFA5D550A9EBFF6AF85300F65416AE802EB356DB70EC45CB40
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5326ff76742935119c175266b75553b49bc6a97a086d4ba5069e11749fe8eb8e
                          • Instruction ID: 35698879ecf8c4134b4fc65d325885831f79a95a2d1c79767efac64e5aed1044
                          • Opcode Fuzzy Hash: 5326ff76742935119c175266b75553b49bc6a97a086d4ba5069e11749fe8eb8e
                          • Instruction Fuzzy Hash: 8221B13174C6439EEF618A7D99447AB6FE5EB44294F08493BD44EC2790E3A0DC86C361
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cfd2820292fe4947466ced9b5375c2cb9395daf698e17e81b4d3cf5e504fb6d3
                          • Instruction ID: 3b97ca779fd5122dcf5efb4fca1651e1f0ebb106005023cacff5391ea19ccfe8
                          • Opcode Fuzzy Hash: cfd2820292fe4947466ced9b5375c2cb9395daf698e17e81b4d3cf5e504fb6d3
                          • Instruction Fuzzy Hash: AC4147B5D04629DFDBA5CF29CC84BD9BBF1AB49300F1081EAA40DA7250EB319A94DF40
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 67c7b94a32dda68fc0f076b43593fc7a84d5402fdef2fa55a45373931c34987f
                          • Instruction ID: df36c3d84a447c3a9bb270a87e69b65207a786dd9bfb12286fcf032cb30235d2
                          • Opcode Fuzzy Hash: 67c7b94a32dda68fc0f076b43593fc7a84d5402fdef2fa55a45373931c34987f
                          • Instruction Fuzzy Hash: E3312870A0120A8FCF09CFA4D180A9EBBF2BF89300F654166E805AB355DB70ED42CB40
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5e145746231041d71a0aaed4b7e5b51e78ba2fe6f1f26181f0734033c9b10e44
                          • Instruction ID: cb888668d650f15789b13ed3e9bd12bd20697e94202df0ff55e7e8636ca01d02
                          • Opcode Fuzzy Hash: 5e145746231041d71a0aaed4b7e5b51e78ba2fe6f1f26181f0734033c9b10e44
                          • Instruction Fuzzy Hash: E321A335F009148FC34AABB8E95966E7B77FF89306B50476CE406833A6DF324826CB51
                          Memory Dump Source
                          • Source File: 00000006.00000002.3319055317.0000000000ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ABD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_abd000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b6603f62867fe619609e868c26f9a22398afbc418ff1288b32ce939f33b835af
                          • Instruction ID: 33110a4cd02de09ebf8a7c5a7e17d473c4100f7eb2956bc7e9f4c3e1a614ecfd
                          • Opcode Fuzzy Hash: b6603f62867fe619609e868c26f9a22398afbc418ff1288b32ce939f33b835af
                          • Instruction Fuzzy Hash: 23213475504244DFCB15EF14D9C4B66BF79FB88324F24C569E90A0B247D33AD80ACBA2
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: af23a429fd0d52b12c4ea3363a035b535775d815d14d94770514c3f0b66d1aee
                          • Instruction ID: 29ac2677bbe99fbd57ffd429525d4f9ea3a631a20bf02da45c7489b21ea38569
                          • Opcode Fuzzy Hash: af23a429fd0d52b12c4ea3363a035b535775d815d14d94770514c3f0b66d1aee
                          • Instruction Fuzzy Hash: 6721A475E041058FCB41EFB8D944AAEBBB2FF89301B548569E401EB366DB34AD06CF51
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: adbe0f3aa07b30ac2de7442f13c1d3b8fc9d384440bc95b84aa67caae0b23db5
                          • Instruction ID: 93550e4b7069e26c6ab1e1a5a2a0832f2d66947d586368345c372ea223a1c96e
                          • Opcode Fuzzy Hash: adbe0f3aa07b30ac2de7442f13c1d3b8fc9d384440bc95b84aa67caae0b23db5
                          • Instruction Fuzzy Hash: 1811C8B490510CAFC745CF98DC459ADBFF8EB46710F1081EAEC2893392C7315A51DB91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4fb2e07b2e2697162d3914f412659a564c15e83996180888dba886288d19fb37
                          • Instruction ID: 09851bd2e4a0d4218de3ee9be81710ff7ded442e2bae2225a6985cfc171634af
                          • Opcode Fuzzy Hash: 4fb2e07b2e2697162d3914f412659a564c15e83996180888dba886288d19fb37
                          • Instruction Fuzzy Hash: 1411C831D0070ADBDF19CFA4C5545DEBB72BF86300F20822AE801BB701DBB09946CB40
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 34327f972379fe01c925533a43dbc0f3cbb39c5e3a17332aeb9e71dfaad56336
                          • Instruction ID: 7750a13b94973b0987595cf5c418c8fa5613b2d15e0f49b20821ed8897855a91
                          • Opcode Fuzzy Hash: 34327f972379fe01c925533a43dbc0f3cbb39c5e3a17332aeb9e71dfaad56336
                          • Instruction Fuzzy Hash: 3B116374E002099FCB45EFB4D945AAEBBB6FF89300F508569E401AB365DB70AD05CF91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3319055317.0000000000ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ABD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_abd000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 42ffd1060d4716d88ab02c1f84f02b90d98ab478aa7c1853a2e815d1f450a477
                          • Instruction ID: 44c37e7fbc55e842e5812832bc9093b565cfa0043c0f45efb7b965554aa99791
                          • Opcode Fuzzy Hash: 42ffd1060d4716d88ab02c1f84f02b90d98ab478aa7c1853a2e815d1f450a477
                          • Instruction Fuzzy Hash: E311D376504280CFCB12DF14D5C4B56BF71FB84314F24C5A9DC090B656C33AD85ACBA2
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: da2153184cf91d5f30b485aa7e7386322ce4aa201af8c0fac097338f62e3c90b
                          • Instruction ID: ba186b9de198b5168ddef03edef8ed51b6c335a6f159ac37d62b769acc67db39
                          • Opcode Fuzzy Hash: da2153184cf91d5f30b485aa7e7386322ce4aa201af8c0fac097338f62e3c90b
                          • Instruction Fuzzy Hash: 441182B4D06208EFC744CFA8DC469ADBBFCEB4A210F1081A9A818A7391CB355A51CB91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a46de8149d1d2c2f6bad90e61e2e5be9fc178081a363ee475faea1e919fd042f
                          • Instruction ID: f0dd2df05b5506c672940a920d2f60d5ae3dee0e95e3ae3a23d7020f937f1af4
                          • Opcode Fuzzy Hash: a46de8149d1d2c2f6bad90e61e2e5be9fc178081a363ee475faea1e919fd042f
                          • Instruction Fuzzy Hash: 8B111574A001068FDF14DBA8E958BAD7B71EB48720F160566E50BAB3A1CB319986CB41
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 26aa852b8b84b99efee1abca2011cd6dace41216078116ac14897ca95287e367
                          • Instruction ID: 0a8969fd3f4dbbab3b353b6166f655e6b535486c21109d391e69ab0cfa6be05f
                          • Opcode Fuzzy Hash: 26aa852b8b84b99efee1abca2011cd6dace41216078116ac14897ca95287e367
                          • Instruction Fuzzy Hash: 9001D230B085419FDB1187798810B7ABFA2AF8B340F18446AE44FD73A2CA608C42CB51
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a7cd0c17036d1805abff4719f0dd8e8f9658e745d28a166c5ee19502383566ef
                          • Instruction ID: 154341e0e0fab927cd309d1ed71f692668c59af5836111a1ac269606f264cb51
                          • Opcode Fuzzy Hash: a7cd0c17036d1805abff4719f0dd8e8f9658e745d28a166c5ee19502383566ef
                          • Instruction Fuzzy Hash: 51012631B041019FDB109AA99800B6ABADBEFCA350F140437F51FD73A1DA719C42CB91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d0b1e9b32aa5e7fda5dd66c15b2b6213159d62f2c6f3870c571d713d259e0f76
                          • Instruction ID: 0f7e5c7d8ccfa2c491857a0cb4c16ce2ad32b84d0a32536127e706a1bab07ad3
                          • Opcode Fuzzy Hash: d0b1e9b32aa5e7fda5dd66c15b2b6213159d62f2c6f3870c571d713d259e0f76
                          • Instruction Fuzzy Hash: B7118E747042018FDB46EB2CD458B2A3FA2EF85305F24516AD40ACF3AADB32EC42CB40
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4ab44687d341fb108bcc00ae7cd3a05095a7ea60467499f859e4d290773f8665
                          • Instruction ID: 6b95aa950d85217816b7276f90760245d059bec9afd772972a258761846f0cc2
                          • Opcode Fuzzy Hash: 4ab44687d341fb108bcc00ae7cd3a05095a7ea60467499f859e4d290773f8665
                          • Instruction Fuzzy Hash: 3611A2B4E002099FCB84DFA9C9456BFFBF1FF89300F60856A9518A7395DB349A418B91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e53d7ab8f848b8aa244f227165e75db83a60bde44794a7853475c4c7b7e1002f
                          • Instruction ID: d5a8c98cca8084152cfe77f0923f15d34d67d92fbbb5dc6b9ee8c933ded0e133
                          • Opcode Fuzzy Hash: e53d7ab8f848b8aa244f227165e75db83a60bde44794a7853475c4c7b7e1002f
                          • Instruction Fuzzy Hash: E8011A74B00206DFDB14CBA5C894B6EBBB1BF49314F150066D40BDB3A1DBB49802CB00
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c6bef88170e0283f58a86ea1f4210f54ab689f1bb9597998a0234ee0d92f6e3f
                          • Instruction ID: 18c54eba52f8c1dc6f84847b9346a103e47e938ad67eb00c84bf1c936db829c2
                          • Opcode Fuzzy Hash: c6bef88170e0283f58a86ea1f4210f54ab689f1bb9597998a0234ee0d92f6e3f
                          • Instruction Fuzzy Hash: AD018F7180420AABCF01DFA8CC008EEBB35FF4A320F00815AE55867251D731A565DBE0
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a62a81b3d72db1ea4fc50050e18c053d7c02b372440e7fbf86722387ada24d4b
                          • Instruction ID: 74cebc27cebd99be2a0461d3fa0e646a32e0b15385c2ec47eb1c56c22a1c74d9
                          • Opcode Fuzzy Hash: a62a81b3d72db1ea4fc50050e18c053d7c02b372440e7fbf86722387ada24d4b
                          • Instruction Fuzzy Hash: D2F0F6317059804FC747B378A8196AEBF67CEC720234901A9E086C71B3CE21088B8756
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 668fbb484086d6626f3717dbe51f5b7ca469a6bbba62c11e5605e371396931a7
                          • Instruction ID: 6569247e04194381788afd1f9a4545c8966385322b9eca788839c699bc215694
                          • Opcode Fuzzy Hash: 668fbb484086d6626f3717dbe51f5b7ca469a6bbba62c11e5605e371396931a7
                          • Instruction Fuzzy Hash: 5601D4B49192158FCB54EF68D888AAAF7B1FF4A300F0040D6EA5A57359CB345F46CF40
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: da319784280aea1e07975664cd02e8014dfafcb8b3fb78e5dd1964b4d65f8e8c
                          • Instruction ID: 84db413f1dbd7fef7e06c6db63fd91a1425d69577e67591fa4d7fa8898fe4771
                          • Opcode Fuzzy Hash: da319784280aea1e07975664cd02e8014dfafcb8b3fb78e5dd1964b4d65f8e8c
                          • Instruction Fuzzy Hash: B5F04F75905109EFCF06DFA4D8449ADBF75EF4A310F1081DAFC5897261C3324A61DB51
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 93c887177e9e110e5650d5b2c186f049ab46433a2c63c5e317527b7840f374ce
                          • Instruction ID: b6d41df443c5ad86146530a35c9822fad2d6c348e5622d70ee715c482ee37a32
                          • Opcode Fuzzy Hash: 93c887177e9e110e5650d5b2c186f049ab46433a2c63c5e317527b7840f374ce
                          • Instruction Fuzzy Hash: B1F0197180020AABCF01DF98C8008EEBB75FF89321F00C519E95823250D731A5A2DB90
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e05e53b6f6fd5dde786f2753f9eb280e832621685dc0a65cdcf5705392c5549a
                          • Instruction ID: 1c741057b9129fe57aee7704d503220e68eecddb039119116e839a92ddeb2ea3
                          • Opcode Fuzzy Hash: e05e53b6f6fd5dde786f2753f9eb280e832621685dc0a65cdcf5705392c5549a
                          • Instruction Fuzzy Hash: 7FF0907480A208BFCB06CF98D8449EDBF79EF49200F00C09AF85457391C7359A21EB51
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7b413c573e2549b4f9ed64b240f89b89662ebe11bba79d721d877ee6c366ad7d
                          • Instruction ID: fb1431506f883cc0ead4374abf844ef1644842e304ecc797e8a3d93ff340769e
                          • Opcode Fuzzy Hash: 7b413c573e2549b4f9ed64b240f89b89662ebe11bba79d721d877ee6c366ad7d
                          • Instruction Fuzzy Hash: 2EE0E5327008104B864AB3BDB91826E7A9BDFC57527800528F00AC72B2CF310D868395
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 79c8029bbaae9f485184ccfcc66e28458b843e28f831deb49492b2fc22ddc44e
                          • Instruction ID: 804c846868d69eff3002f5b081e24e87cbfd6409873d7c5e10f3b1558caa5fc9
                          • Opcode Fuzzy Hash: 79c8029bbaae9f485184ccfcc66e28458b843e28f831deb49492b2fc22ddc44e
                          • Instruction Fuzzy Hash: 60F0E2B8809308BFC745DB94C8449E8BFBAAB49310F0080AAE804A3351C7394A16DBA1
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a8d74388883b1eb8dab70658b23b0dff3498768bb610b9fd0cd8071c0f63c559
                          • Instruction ID: bf3be400d5271d5da909312cb8072001d93926b9b4ac2860f1492f1c24d0708c
                          • Opcode Fuzzy Hash: a8d74388883b1eb8dab70658b23b0dff3498768bb610b9fd0cd8071c0f63c559
                          • Instruction Fuzzy Hash: 600128B181021BDBCB25DF54C844BDAF771FB49300F008695EA1863650D771AAD1DF80
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 438b2105348970c5b403f1bd3cf04a7c2ee644f7035fe8a9147dfc5e768e9ebf
                          • Instruction ID: cfb8064bbb26af38b3b91c71ca8f0d04d4739481759d04803a3aea5fd6161de3
                          • Opcode Fuzzy Hash: 438b2105348970c5b403f1bd3cf04a7c2ee644f7035fe8a9147dfc5e768e9ebf
                          • Instruction Fuzzy Hash: 41F0BE31208B814FC353EB78E5505C9BFA1EF863103548EA9E086475A7CAB0A94AC790
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c80873db3f7715a8c64307057da1a1535dc9000e328da45186c8580b0d3c617b
                          • Instruction ID: 982da635c6333283f335459617929d7d34d16e374ab81bf9bf505b7faf513008
                          • Opcode Fuzzy Hash: c80873db3f7715a8c64307057da1a1535dc9000e328da45186c8580b0d3c617b
                          • Instruction Fuzzy Hash: ADF02B701072459FC755EF68EC51A697FB89F42210B10C1EAF84C972A3CE359D12CBA2
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a7ac6561fa8de23fcb2cbd0a6561bfca9099acd5a86ea1df7cd914b589041cc8
                          • Instruction ID: 7ad9c3180aa693d6452734ead6f9f1e8fc329e5270643b2375e23a46c7c8146a
                          • Opcode Fuzzy Hash: a7ac6561fa8de23fcb2cbd0a6561bfca9099acd5a86ea1df7cd914b589041cc8
                          • Instruction Fuzzy Hash: C40114F485622ACFDB24CF00D868BE9B7B2AB0A311F4040E9C50DA3290E3748EC8DF01
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1eda4693a94da8467c86396afeac219ba3622091a69bbe4e44277db89be2ad3c
                          • Instruction ID: 5f5a60fc0a6332771f075153ee5631facec5f97a3cac7a52e5876fb283ac0393
                          • Opcode Fuzzy Hash: 1eda4693a94da8467c86396afeac219ba3622091a69bbe4e44277db89be2ad3c
                          • Instruction Fuzzy Hash: 52F0E2B0809244AFCB05CFA4C8049E8BF76AB4A210F1481EAE84053251C7394A12DF51
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 318233174a29984f374b26ca20202d7de4cb9d0e547da80100c6ec7f85646e81
                          • Instruction ID: b14957ef4e66dca492a4e14d5011242b52b7c7d8c6842acc717e8aacd6d2a872
                          • Opcode Fuzzy Hash: 318233174a29984f374b26ca20202d7de4cb9d0e547da80100c6ec7f85646e81
                          • Instruction Fuzzy Hash: E60114B494121ADFDB64CF04CC84FE8B7B1AB08305F5480E9D508A7280DB759AC5DF00
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ce08ad0fb40e2ee4ed67e40745eda191d082648a7a9cc005af7ae4921f159f86
                          • Instruction ID: b04ea72d4fd7c658dcb094e10c9c5bdc32ad365717ea73603f7a90810a5d63d4
                          • Opcode Fuzzy Hash: ce08ad0fb40e2ee4ed67e40745eda191d082648a7a9cc005af7ae4921f159f86
                          • Instruction Fuzzy Hash: 10F05E78909108FFCB45CFA8D844AADBBB5EF48314F10C1A9E85427251C7339A62EF44
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 995888cc86c7987f57f8f74f2d6983fd1fa841b1fd0231e751b98d2c6c6dd7fc
                          • Instruction ID: 9dba0a41237b59796a52b7539ca0eb4cd3b32d8301a69271c18e556fea1ee73d
                          • Opcode Fuzzy Hash: 995888cc86c7987f57f8f74f2d6983fd1fa841b1fd0231e751b98d2c6c6dd7fc
                          • Instruction Fuzzy Hash: C9E0657450A204AFC705DB64DC559A97F79EB42310F1441D9E81457292C6355E51C7A2
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c6d22f9d45e3753d9fdeef4d5e0dfd0d574dd2aab80320fa3216da3f089f360b
                          • Instruction ID: 9bbe81b63ee798a9f76f5eb4c401258bb264bca7f5dd6cea1beadeb74dc877b1
                          • Opcode Fuzzy Hash: c6d22f9d45e3753d9fdeef4d5e0dfd0d574dd2aab80320fa3216da3f089f360b
                          • Instruction Fuzzy Hash: EAE086F004F786BBD709D7648C06EEA7F6E9B03645F8411D5A41453293C7692A5CC3A6
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fbc2e47c683ed99e774b783f180b100b8af1129f4cc41a03e82de651000a576f
                          • Instruction ID: 9af910e1df94fc06b9e4b090043c4a02973cc11968fe803fce31aeedcf9ab754
                          • Opcode Fuzzy Hash: fbc2e47c683ed99e774b783f180b100b8af1129f4cc41a03e82de651000a576f
                          • Instruction Fuzzy Hash: 7DF01274D04208EFCB84DFA8C840AADBFF8AF48311F14C1AAA958D3351D6359A51DF50
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5b5388a4e32c3b9d88c5ab017488267de494158cedfe8460ed3868013d6b7357
                          • Instruction ID: 28a93ce48881ad5f96f4e520ea62e6ec38f9970719fa7a3d4466dea668af4a2c
                          • Opcode Fuzzy Hash: 5b5388a4e32c3b9d88c5ab017488267de494158cedfe8460ed3868013d6b7357
                          • Instruction Fuzzy Hash: 55F01574805208EFCB46CF98D8449ACBBB5FB49310F10C1A9EC54623A1D7369A61EF41
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c6ca53c7251f951fe59a721c0b4ef1e7f429465a5b5c85aa0ee5800f62e1700d
                          • Instruction ID: f0bd507ae54a4871d04b4af547fa776e94160918fcfedc3bcb2b21a6bcb10aec
                          • Opcode Fuzzy Hash: c6ca53c7251f951fe59a721c0b4ef1e7f429465a5b5c85aa0ee5800f62e1700d
                          • Instruction Fuzzy Hash: 48F01574904208EFCB45DF98D840AACBBB5FB48310F10C1A9EC1863361C7329A61EF51
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e981b42afafc4c5f4e8af67445459a272f9f9f5cffc5ff8e5054c3ffb88cf5d3
                          • Instruction ID: c9d0806900d14857711ef87a47c8d3bca8437d24ace7942c1457577a0552581a
                          • Opcode Fuzzy Hash: e981b42afafc4c5f4e8af67445459a272f9f9f5cffc5ff8e5054c3ffb88cf5d3
                          • Instruction Fuzzy Hash: 74F0E231A140488FDB90FF48D5443AD7776EB46300F100594A00A573C5CF301E8CCB80
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 31f40e95849033f4186c398b05444add4f84275e84289801e7031eb9523a1c7a
                          • Instruction ID: d99902309fdfb8e1e3cd8be9dc48c585bb631dc7df67248f4164d8913ecd4d70
                          • Opcode Fuzzy Hash: 31f40e95849033f4186c398b05444add4f84275e84289801e7031eb9523a1c7a
                          • Instruction Fuzzy Hash: 2DF0B471510045CFC754EF68D95899BB776FB49301F0040D6E449A7349CB701F85DF90
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e2189f9fdf6225d8bf3500ec4275faeb48d4aac6153466be5f6e420481889d7e
                          • Instruction ID: 4095d015cf5b5f547c43ab057325e720cea825defda1fde9b589f0177fa0f9cd
                          • Opcode Fuzzy Hash: e2189f9fdf6225d8bf3500ec4275faeb48d4aac6153466be5f6e420481889d7e
                          • Instruction Fuzzy Hash: 06F01578804208FBCB45CFA8C8449ACBBB5AB48310F10C1A9E85462251C7369A61EB40
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2cecfa7d03dbd89d4529d8f989602e0088a8aedb29e01657ab3e2b20417e6c52
                          • Instruction ID: 167f982bc89d7d271a6e5cf81737e8b49c9c68c3f43c5a8c657d99b302082931
                          • Opcode Fuzzy Hash: 2cecfa7d03dbd89d4529d8f989602e0088a8aedb29e01657ab3e2b20417e6c52
                          • Instruction Fuzzy Hash: C0F0B2B491122ACFDB24DF14D998FE9BBB1BB0A315F4040EAD509A32A0E7749AC5DF40
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2fa05abb20ab66634a5099481d073750d54b995cdb53ec00225cec2fabeea72a
                          • Instruction ID: 370cda7bcf1cd7c531288e062e091bcc030d18266d1bc3278268cef9c8816ebf
                          • Opcode Fuzzy Hash: 2fa05abb20ab66634a5099481d073750d54b995cdb53ec00225cec2fabeea72a
                          • Instruction Fuzzy Hash: 6DE0EDB4D05208EFCB84DFA8D840AACFBF4EB48310F10C1A99818E3351D6359E51DF91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2fa05abb20ab66634a5099481d073750d54b995cdb53ec00225cec2fabeea72a
                          • Instruction ID: 7d9ddac1714d05655d3b587ab297edb6d230ba06c5271f078a00027aa07b2533
                          • Opcode Fuzzy Hash: 2fa05abb20ab66634a5099481d073750d54b995cdb53ec00225cec2fabeea72a
                          • Instruction Fuzzy Hash: 8FE0ED74D05208EFCB84DFE8D840AADFBF4EB49310F10C5A99828A3351D735AA51DF91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2fa05abb20ab66634a5099481d073750d54b995cdb53ec00225cec2fabeea72a
                          • Instruction ID: dd02babb008517d028b77febd46f423c321206eb58553ed404319e8cc53306f5
                          • Opcode Fuzzy Hash: 2fa05abb20ab66634a5099481d073750d54b995cdb53ec00225cec2fabeea72a
                          • Instruction Fuzzy Hash: 7AE0ED74D05208EFCB84DFA8D840AADFBF4EB48310F10C1A99918A3351D735AA52DF91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2fa05abb20ab66634a5099481d073750d54b995cdb53ec00225cec2fabeea72a
                          • Instruction ID: 02a0e9a19445650d29b64adf780f75bc55cefbb53402e860e3e485bb60a004a7
                          • Opcode Fuzzy Hash: 2fa05abb20ab66634a5099481d073750d54b995cdb53ec00225cec2fabeea72a
                          • Instruction Fuzzy Hash: 27E06D74D04208EFCB84DFA9D840AADFBF5EB48301F10C1AA9818A3310D6359A41DF80
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f0d7d30fcd1caef37de55737270ee9770cd136557098005bdb4f4439ec83710e
                          • Instruction ID: 436f99f546c71548878c3b64c5a0a1577ea63bae6815f1846d7462675669ceec
                          • Opcode Fuzzy Hash: f0d7d30fcd1caef37de55737270ee9770cd136557098005bdb4f4439ec83710e
                          • Instruction Fuzzy Hash: 8FE0E5B4905208ABCB84DF98D845AACBBB8AB49310F10C1AA9C54A3391C6359A52EB95
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f0d7d30fcd1caef37de55737270ee9770cd136557098005bdb4f4439ec83710e
                          • Instruction ID: 0f1a10abbd58922d70ef7eef05303af21342699026ad51b1f3b15a6d5a60bbab
                          • Opcode Fuzzy Hash: f0d7d30fcd1caef37de55737270ee9770cd136557098005bdb4f4439ec83710e
                          • Instruction Fuzzy Hash: B0E0E5B4905208ABCB44DFA8D844AACBBB4AB49310F10C1AA9C5463391D7359A52DF85
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b60ea7b395b16a17ef135b33e008bae58473d39ff921466b79028cfc15cab059
                          • Instruction ID: cbf20109d072aface8eef9ca8a12a43ec843dd9db39b0b868fe09eebbb16dab8
                          • Opcode Fuzzy Hash: b60ea7b395b16a17ef135b33e008bae58473d39ff921466b79028cfc15cab059
                          • Instruction Fuzzy Hash: 3BE08678909108EFCB44DF98D8409BDBFB8AF45311F10C1A9D95497351C6319A42DBA5
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bb68d547b86c3c4f3c3b5f1a7e34a94d39e8a459a3faf534f362f9ebc0a57d6b
                          • Instruction ID: 2ce7a370b24b09cffe6960c3d49fc89431313b1c36fb5920f00d683132b5613d
                          • Opcode Fuzzy Hash: bb68d547b86c3c4f3c3b5f1a7e34a94d39e8a459a3faf534f362f9ebc0a57d6b
                          • Instruction Fuzzy Hash: BFE01AB4D05108EBCB44DF98D845AACBBF8EB88300F2081A99C1893351CB316A52CB41
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6df9d6cda42488916d2fb87a2eecc4ce5b6cbe1cfd69db101da02c8885608eba
                          • Instruction ID: 83e94ba620034eab5015d9873ef46aad06066d4c9cccce35dbb52f8da1168caa
                          • Opcode Fuzzy Hash: 6df9d6cda42488916d2fb87a2eecc4ce5b6cbe1cfd69db101da02c8885608eba
                          • Instruction Fuzzy Hash: DEF0A5759122199FCF29EF50DE65BDDBBB2BF49300F101099A209B7290DB302E84DF05
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 485376e63dc0061a19b90c9c69242926ecdcc7d681395cb500b5f59372b80570
                          • Instruction ID: e61dff0a5e6daec480199d34490f35bc8cb3fb1e841007f772f018650edc4817
                          • Opcode Fuzzy Hash: 485376e63dc0061a19b90c9c69242926ecdcc7d681395cb500b5f59372b80570
                          • Instruction Fuzzy Hash: 51E04F74D05208EFCB84DF98D4416ACFBB4EB48300F10C1E9D85853351D6355A42DF91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4503f88ee45125bb08b2b2437acc3cb9643e49969761c2ffa39d868b2091a431
                          • Instruction ID: 1f2690b876c8f42eac93c91fe2b4d275f924679e1236d5b7c9b7ffa1d591dbf2
                          • Opcode Fuzzy Hash: 4503f88ee45125bb08b2b2437acc3cb9643e49969761c2ffa39d868b2091a431
                          • Instruction Fuzzy Hash: 52E0E671C0A2489FCF91DFF8950559EBFF4AA4A110B104699DC49E2562E67149118B91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b2d5eeef0b508a540039278579829092a83272c25cecf7c9d17f4469c075ddce
                          • Instruction ID: 06966c67caf0d1f56f6c79ccb36bd9bb75e6527a8663832dd5f09fd52d855b10
                          • Opcode Fuzzy Hash: b2d5eeef0b508a540039278579829092a83272c25cecf7c9d17f4469c075ddce
                          • Instruction Fuzzy Hash: 6BF0A5F484622ACFDB648F24D948BA9B7B1AB04315F8001EAD50DA3690E7389AC4DF00
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3e1e9de4a45e85ba8ece0f9c7ef01ab34338599ed3a6c49ebb2c022c1c25bfe3
                          • Instruction ID: 2a2b8c59d044bf4862fc547c9c9fb9d9e85f220d2bb614a25cc279343e46ff49
                          • Opcode Fuzzy Hash: 3e1e9de4a45e85ba8ece0f9c7ef01ab34338599ed3a6c49ebb2c022c1c25bfe3
                          • Instruction Fuzzy Hash: 8CE0C2B4909108DBCB08DFA8D8449ACBBB8FB45300F2081E8D80823391CB356E52CB81
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 26b9bebb6ccc660c5cc1c12129a53a160bc436f46ebd11848706a46fbb93ae82
                          • Instruction ID: 72e28656d48e84cbea6d34f23a41eb6de5e87b40988df12141f1028beea233e7
                          • Opcode Fuzzy Hash: 26b9bebb6ccc660c5cc1c12129a53a160bc436f46ebd11848706a46fbb93ae82
                          • Instruction Fuzzy Hash: 09E0EC74D45208DFDB84DFA8D8456ACBBB8AB04205F1041A9D908A3250EB705A44CB51
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4630c0cc380672881a10070ca2d7e3afa542c4af53251e1812f3e0d508212250
                          • Instruction ID: 2e4d64ab0c0e6be33c77528e1cda978e293276538c51d16cc715a0525219e253
                          • Opcode Fuzzy Hash: 4630c0cc380672881a10070ca2d7e3afa542c4af53251e1812f3e0d508212250
                          • Instruction Fuzzy Hash: D4E0C234D09108DBDB44DF98D8409BCBBB8EB46300F2091A9C81827351CB316E42CB91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4d3bc4590cc3618fd4bf39b7305f8ef7239c4e49c66ca27a2aa3f837548c2982
                          • Instruction ID: 79537da8608c49ab39d6ed9ca73b35c7a8539c0815f37adda1a0b725bd2b2eb0
                          • Opcode Fuzzy Hash: 4d3bc4590cc3618fd4bf39b7305f8ef7239c4e49c66ca27a2aa3f837548c2982
                          • Instruction Fuzzy Hash: A7E06D72A200488FDB94EB54E5947AE7666EB85300F000999A10A67385CF311EC8CF50
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d5166ffa88406647e798239ac9782c61ef0d8b5636d5d67039090f3024217d7d
                          • Instruction ID: 0e00c0bf43f235039b6fd48685b7b9d282936cd110727d1fa250b2d6f8e04c40
                          • Opcode Fuzzy Hash: d5166ffa88406647e798239ac9782c61ef0d8b5636d5d67039090f3024217d7d
                          • Instruction Fuzzy Hash: 97D023F044710EDBC74CCBA8D805FF9776CD703600F001268841513350CB701D14C545
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a9d5528c019bd1f21eb18575a867b1d8da5e8120524f8eb3e8f44a0c6a571126
                          • Instruction ID: 139054c535e870e08c67a19779d96316bf7b6d28b8314be59c2c305268c99193
                          • Opcode Fuzzy Hash: a9d5528c019bd1f21eb18575a867b1d8da5e8120524f8eb3e8f44a0c6a571126
                          • Instruction Fuzzy Hash: 70E0E2B4922219ABCF29DF90DE28F9DBBB2BB08300F100095E609B62A0D3305E90DF00
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b0701cd0daf6488e0301c34493fc8bda90ff1c1ebbf74ab8c2478a5e0c7a9832
                          • Instruction ID: 139054c535e870e08c67a19779d96316bf7b6d28b8314be59c2c305268c99193
                          • Opcode Fuzzy Hash: b0701cd0daf6488e0301c34493fc8bda90ff1c1ebbf74ab8c2478a5e0c7a9832
                          • Instruction Fuzzy Hash: 70E0E2B4922219ABCF29DF90DE28F9DBBB2BB08300F100095E609B62A0D3305E90DF00
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4bcf8efe5e142cf9b3fff2a1dd2e0c9e13be7942fe2742075ab652c9e6aedb2b
                          • Instruction ID: 1b5a1906288fbf738320c6413a2ea8248e28170afe14344ddba43bc5c7d7bbee
                          • Opcode Fuzzy Hash: 4bcf8efe5e142cf9b3fff2a1dd2e0c9e13be7942fe2742075ab652c9e6aedb2b
                          • Instruction Fuzzy Hash: FAD092B0D052089F8B80EFB8980526EBBF8AA08200B5046AAD809E2211FA744A118B91
                          Memory Dump Source
                          • Source File: 00000006.00000002.3345119388.0000000007160000.00000040.00000800.00020000.00000000.sdmp, Offset: 07160000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_7160000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7cdb63db5f8fc48acc1956b59bb5325b84bc2e7f8d55a24b01c1a3292dec0ec2
                          • Instruction ID: f00be111a10ba7dfd4cd6ffd9160bd21802cf715c03f6344a4ef50c98b5d4572
                          • Opcode Fuzzy Hash: 7cdb63db5f8fc48acc1956b59bb5325b84bc2e7f8d55a24b01c1a3292dec0ec2
                          • Instruction Fuzzy Hash: 92D0C9F9C0A3AA8BCB25CF609914BD9BBF0AB1A314F1001D6891DA72D1E7740A55CF41
                          Memory Dump Source
                          • Source File: 00000006.00000002.3344755989.0000000006F80000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F80000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_6f80000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cba338c2d49e106a5652c5e99d7664ab9ca0b6a564e930cb3958666e57f16ac2
                          • Instruction ID: f9f4d53cb37f5e04de703a412e74ddabe349857596c841c7454abf0215a150aa
                          • Opcode Fuzzy Hash: cba338c2d49e106a5652c5e99d7664ab9ca0b6a564e930cb3958666e57f16ac2
                          • Instruction Fuzzy Hash: CDC02B3008F20487EED4AB8C689CBB833DC4707303F00F520A30C020334AB55044D5F5
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4a8b00da53a5c307b1232496788d4193f5fb646dd6e1b97dbb6ecbffdf91e9f5
                          • Instruction ID: 6be1a629b426e40c6e1687c0822e838a931c041f810696b7793bf8e1d6da5f5c
                          • Opcode Fuzzy Hash: 4a8b00da53a5c307b1232496788d4193f5fb646dd6e1b97dbb6ecbffdf91e9f5
                          • Instruction Fuzzy Hash: 74C0122508E7C22FC70383B8986A4E47F308C0B00030802CEC4CA86873C1418017CB02
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a2f3812a167a037829dcde80f15c97ef68ca9d60d5471ccbea7f57de43952dcf
                          • Instruction ID: 7146176d88a6e2d52e35afa171b1231165e85d3b5a66086ace86eaf49249fa4f
                          • Opcode Fuzzy Hash: a2f3812a167a037829dcde80f15c97ef68ca9d60d5471ccbea7f57de43952dcf
                          • Instruction Fuzzy Hash: B7B0127114E10CCACC268F9828040343E14D7909027900387E80E48011DD010C63C563
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ed6742500d2ed6a7673ef2e4c5d7386898f1cadc73e76978a1959be0b8eb8070
                          • Instruction ID: 8d313816e21713b9be6997d8bfad8089e6d17cf7227f71f5c62b407ad39f779f
                          • Opcode Fuzzy Hash: ed6742500d2ed6a7673ef2e4c5d7386898f1cadc73e76978a1959be0b8eb8070
                          • Instruction Fuzzy Hash: FD90023108861D8B554067D57909555775C96485557800155A50D419235A5564114599
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 728d0b748ebdcf6099389bc2cec8991832ca85a3040e2eecb27eefd6e4ced376
                          • Instruction ID: 219bdd630870435cec53b9fa223b35abbb3387f3791592eaf6b245f23f4ff3eb
                          • Opcode Fuzzy Hash: 728d0b748ebdcf6099389bc2cec8991832ca85a3040e2eecb27eefd6e4ced376
                          • Instruction Fuzzy Hash: EDA022228080C20ACB00222C00220C2BBB0FE8BA083CA00CCC082A8003C20083B322C8
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 762429b5f822b52a4b331574598a8dcbbac48d553935b18a572e29804df70d93
                          • Instruction ID: 71036a168495b50fba8d6fa2830b7c60315a0ea555a635e863dec5ed4b4b3251
                          • Opcode Fuzzy Hash: 762429b5f822b52a4b331574598a8dcbbac48d553935b18a572e29804df70d93
                          • Instruction Fuzzy Hash: DAC04C3140E2909ECE034E6885853796D246F57520715D9DBD8460E517D51994C7D739
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: eef2a47dcc5a2c7bdd0171b17dd36db77e9baf15441313fe99accd876f4189a3
                          • Instruction ID: e6b6e66efb517b4261bee5b9a5a75608e5f06c0b68a7b0a5b6908e5b9054c8cb
                          • Opcode Fuzzy Hash: eef2a47dcc5a2c7bdd0171b17dd36db77e9baf15441313fe99accd876f4189a3
                          • Instruction Fuzzy Hash: FCC04C2140E2848EDE074E2995D03356D196F53150B14E5DBD8464F517D618C4C7D625
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 4cd317eb249ea2675cbfda6876cdf9e4f7a42f777a45047556d4e9aa1d1a6012
                          • Instruction ID: f7af9273995eee18f651fdf2cd47855d7ac75290deb582532ad7552fd7843f7e
                          • Opcode Fuzzy Hash: 4cd317eb249ea2675cbfda6876cdf9e4f7a42f777a45047556d4e9aa1d1a6012
                          • Instruction Fuzzy Hash: 10B00130609100CEDA569E5089906247A70BF83749B3595EAC84B5F61AC324D8CBDA16
                          Strings
                          Memory Dump Source
                          • Source File: 00000006.00000002.3321687161.0000000002490000.00000040.00000800.00020000.00000000.sdmp, Offset: 02490000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_6_2_2490000_cvchost.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$jjjjjj$$cq$$cq
                          • API String ID: 0-3956854001
                          • Opcode ID: 823ed2d2df556360fd5e084fec3c2391a191aba04b4eb5bfb00d3a94b3d459a9
                          • Instruction ID: 684dc030fb23bfdba21e6abad810ff9dfcf46fe7d1064f06cda97ee3250a5b8b
                          • Opcode Fuzzy Hash: 823ed2d2df556360fd5e084fec3c2391a191aba04b4eb5bfb00d3a94b3d459a9
                          • Instruction Fuzzy Hash: DAB012B1807380CFC7048E008185740BFD0BF40209F17C0DDC1000F053923DC10BC600

                          Execution Graph

                          Execution Coverage:8.4%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:11
                          Total number of Limit Nodes:0
                          execution_graph 10033 ac5208 10035 ac5211 10033->10035 10036 ac6b87 10033->10036 10039 acd330 10036->10039 10041 acd343 10039->10041 10043 acd3e0 10041->10043 10044 acd428 VirtualProtect 10043->10044 10046 ac6b9d 10044->10046 10047 acd5b0 10048 acd5f0 FindCloseChangeNotification 10047->10048 10050 acd621 10048->10050

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 4c119e8-4c11a1a 4 4c11a20-4c11a34 0->4 5 4c11e2f-4c11e4d 0->5 6 4c11a36 4->6 7 4c11a3b-4c11af2 4->7 10 4c12267-4c12273 5->10 6->7 51 4c11d71-4c11d95 7->51 52 4c11af8-4c11b00 7->52 11 4c12279-4c1228d 10->11 12 4c11e5b-4c11e67 10->12 15 4c12254-4c12259 12->15 16 4c11e6d-4c11eed 12->16 20 4c12264 15->20 33 4c11f05-4c11f1e 16->33 34 4c11eef-4c11ef5 16->34 20->10 40 4c11f20-4c11f56 33->40 41 4c11f5b-4c11f99 33->41 36 4c11ef7 34->36 37 4c11ef9-4c11efb 34->37 36->33 37->33 40->20 60 4c11f9b-4c11fbc 41->60 61 4c11fbe-4c11fcb 41->61 62 4c11e19-4c11e1f 51->62 53 4c11b02-4c11b06 52->53 54 4c11b07-4c11b0f 52->54 53->54 57 4c11b11 54->57 58 4c11b14-4c11b36 54->58 57->58 68 4c11b38 58->68 69 4c11b3b-4c11b41 58->69 74 4c11fd2-4c11fd8 60->74 61->74 64 4c11e21 62->64 65 4c11e2c 62->65 64->65 73 4c11e2d 65->73 68->69 71 4c11b47-4c11b61 69->71 72 4c11cfb-4c11d06 69->72 75 4c11ba1-4c11baa 71->75 76 4c11b63-4c11b67 71->76 79 4c11d08 72->79 80 4c11d0b-4c11d41 72->80 73->73 77 4c11ff7-4c12049 74->77 78 4c11fda-4c11ff5 74->78 82 4c11bb0-4c11bc0 75->82 83 4c11e14 75->83 76->75 84 4c11b69-4c11b71 76->84 119 4c12164-4c121a3 77->119 120 4c1204f-4c12054 77->120 78->77 79->80 115 4c11d43-4c11d67 80->115 116 4c11d69 80->116 82->83 87 4c11bc6-4c11bd7 82->87 83->62 88 4c11b77 84->88 89 4c11bfa-4c11c93 84->89 87->83 91 4c11bdd-4c11bed 87->91 92 4c11b7a-4c11b7c 88->92 100 4c11c99-4c11c9d 89->100 101 4c11d9a-4c11dae 89->101 91->83 96 4c11bf3-4c11bf8 91->96 97 4c11b81-4c11b8c 92->97 98 4c11b7e 92->98 96->89 97->83 102 4c11b92-4c11b9d 97->102 98->97 100->101 105 4c11ca3-4c11cb1 100->105 101->83 107 4c11db0-4c11dca 101->107 102->92 103 4c11b9f 102->103 103->89 108 4c11cf1-4c11cf5 105->108 109 4c11cb3 105->109 107->83 110 4c11dcc-4c11de9 107->110 108->71 108->72 112 4c11cb9-4c11cbb 109->112 110->83 114 4c11deb-4c11e09 110->114 117 4c11cc5-4c11ce1 112->117 118 4c11cbd-4c11cc1 112->118 114->83 121 4c11e0b 114->121 115->116 116->51 117->83 122 4c11ce7-4c11cef 117->122 118->117 134 4c121a5-4c121bd 119->134 135 4c121bf-4c121ce 119->135 124 4c1205e-4c12061 120->124 121->83 122->108 122->112 126 4c12067 124->126 127 4c1212c-4c12154 124->127 130 4c120d0-4c120fc 126->130 131 4c1209f-4c120cb 126->131 132 4c1206e-4c1209a 126->132 133 4c120fe-4c1212a 126->133 136 4c1215a-4c1215e 127->136 130->136 131->136 132->136 133->136 137 4c121d7-4c12239 134->137 135->137 136->119 136->124 145 4c12244-4c12252 137->145 145->20
                          Strings
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq$TJhq$Tecq$pgq$xbfq
                          • API String ID: 0-2309367897
                          • Opcode ID: 12cd13d373fc7998548739399ba60caa8946dc594c6a93207f9acc27ea242bc0
                          • Instruction ID: d1eab5d0306342b3e257e24ad0d3e5cd9ee4c94d4b1f63377135caf53f104a5f
                          • Opcode Fuzzy Hash: 12cd13d373fc7998548739399ba60caa8946dc594c6a93207f9acc27ea242bc0
                          • Instruction Fuzzy Hash: FF524875A005149FCB15DFA8C984E69BBB2FF89304F1981A8E6099B372DB31ED51DF40
                          Strings
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq$Tecq$xbfq
                          • API String ID: 0-925064040
                          • Opcode ID: a9d269690b5644b12daaefc200b89445b516b0dd90fd65edb8bbfdb552def51a
                          • Instruction ID: 7d260b37aee08cebfe68912b91ad95110c98d26c740cebc56162d5803f321ca6
                          • Opcode Fuzzy Hash: a9d269690b5644b12daaefc200b89445b516b0dd90fd65edb8bbfdb552def51a
                          • Instruction Fuzzy Hash: 8D624970A002288FCB54DF69C894AADB7F2FF89300F1581A9D509E7365DB34AE86DF41

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 790 4ae5d28-4ae5d8e 792 4ae5dd8-4ae5dda 790->792 793 4ae5d90-4ae5d9b 790->793 795 4ae5ddc-4ae5e34 792->795 793->792 794 4ae5d9d-4ae5da9 793->794 796 4ae5dcc-4ae5dd6 794->796 797 4ae5dab-4ae5db5 794->797 804 4ae5e7e-4ae5e80 795->804 805 4ae5e36-4ae5e41 795->805 796->795 799 4ae5db9-4ae5dc8 797->799 800 4ae5db7 797->800 799->799 801 4ae5dca 799->801 800->799 801->796 807 4ae5e82-4ae5e9a 804->807 805->804 806 4ae5e43-4ae5e4f 805->806 808 4ae5e72-4ae5e7c 806->808 809 4ae5e51-4ae5e5b 806->809 813 4ae5e9c-4ae5ea7 807->813 814 4ae5ee4-4ae5ee6 807->814 808->807 810 4ae5e5f-4ae5e6e 809->810 811 4ae5e5d 809->811 810->810 815 4ae5e70 810->815 811->810 813->814 816 4ae5ea9-4ae5eb5 813->816 817 4ae5ee8-4ae5f36 814->817 815->808 818 4ae5ed8-4ae5ee2 816->818 819 4ae5eb7-4ae5ec1 816->819 825 4ae5f3c-4ae5f4a 817->825 818->817 820 4ae5ec5-4ae5ed4 819->820 821 4ae5ec3 819->821 820->820 823 4ae5ed6 820->823 821->820 823->818 826 4ae5f4c-4ae5f52 825->826 827 4ae5f53-4ae5fb3 825->827 826->827 834 4ae5fb5-4ae5fb9 827->834 835 4ae5fc3-4ae5fc7 827->835 834->835 838 4ae5fbb 834->838 836 4ae5fc9-4ae5fcd 835->836 837 4ae5fd7-4ae5fdb 835->837 836->837 839 4ae5fcf 836->839 840 4ae5fdd-4ae5fe1 837->840 841 4ae5feb-4ae5fef 837->841 838->835 839->837 840->841 842 4ae5fe3 840->842 843 4ae5fff-4ae6003 841->843 844 4ae5ff1-4ae5ff5 841->844 842->841 846 4ae6005-4ae6009 843->846 847 4ae6013-4ae6017 843->847 844->843 845 4ae5ff7 844->845 845->843 846->847 850 4ae600b 846->850 848 4ae6019-4ae601d 847->848 849 4ae6027 847->849 848->849 851 4ae601f 848->851 852 4ae6028 849->852 850->847 851->849 852->852
                          Strings
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: \VNl
                          • API String ID: 0-3796923132
                          • Opcode ID: 9397368706f8d36b68f7dc383821963f8a038a11d9db6b36a1e2f97bc133339b
                          • Instruction ID: 81935758a79126009f98e12f9fea20a9c04541b2634a1515d860f7f1919a38b5
                          • Opcode Fuzzy Hash: 9397368706f8d36b68f7dc383821963f8a038a11d9db6b36a1e2f97bc133339b
                          • Instruction Fuzzy Hash: D5915270E00209AFDF14CFEAD9857EDBBF2AF48318F148529E415A7294EB74A845CF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1232 4ae6940-4ae69a6 1234 4ae69a8-4ae69b3 1232->1234 1235 4ae69f0-4ae69f2 1232->1235 1234->1235 1236 4ae69b5-4ae69c1 1234->1236 1237 4ae69f4-4ae6a0d 1235->1237 1238 4ae69e4-4ae69ee 1236->1238 1239 4ae69c3-4ae69cd 1236->1239 1244 4ae6a0f-4ae6a1b 1237->1244 1245 4ae6a59-4ae6a5b 1237->1245 1238->1237 1240 4ae69cf 1239->1240 1241 4ae69d1-4ae69e0 1239->1241 1240->1241 1241->1241 1243 4ae69e2 1241->1243 1243->1238 1244->1245 1246 4ae6a1d-4ae6a29 1244->1246 1247 4ae6a5d-4ae6a75 1245->1247 1248 4ae6a4c-4ae6a57 1246->1248 1249 4ae6a2b-4ae6a35 1246->1249 1254 4ae6abf-4ae6ac1 1247->1254 1255 4ae6a77-4ae6a82 1247->1255 1248->1247 1251 4ae6a39-4ae6a48 1249->1251 1252 4ae6a37 1249->1252 1251->1251 1253 4ae6a4a 1251->1253 1252->1251 1253->1248 1256 4ae6ac3-4ae6adb 1254->1256 1255->1254 1257 4ae6a84-4ae6a90 1255->1257 1263 4ae6add-4ae6ae8 1256->1263 1264 4ae6b25-4ae6b27 1256->1264 1258 4ae6a92-4ae6a9c 1257->1258 1259 4ae6ab3-4ae6abd 1257->1259 1260 4ae6a9e 1258->1260 1261 4ae6aa0-4ae6aaf 1258->1261 1259->1256 1260->1261 1261->1261 1265 4ae6ab1 1261->1265 1263->1264 1266 4ae6aea-4ae6af6 1263->1266 1267 4ae6b29-4ae6b9c 1264->1267 1265->1259 1268 4ae6af8-4ae6b02 1266->1268 1269 4ae6b19-4ae6b23 1266->1269 1276 4ae6ba2-4ae6bb0 1267->1276 1270 4ae6b06-4ae6b15 1268->1270 1271 4ae6b04 1268->1271 1269->1267 1270->1270 1273 4ae6b17 1270->1273 1271->1270 1273->1269 1277 4ae6bb9-4ae6c19 1276->1277 1278 4ae6bb2-4ae6bb8 1276->1278 1285 4ae6c1b-4ae6c1f 1277->1285 1286 4ae6c29-4ae6c2d 1277->1286 1278->1277 1285->1286 1287 4ae6c21 1285->1287 1288 4ae6c2f-4ae6c33 1286->1288 1289 4ae6c3d-4ae6c41 1286->1289 1287->1286 1288->1289 1292 4ae6c35 1288->1292 1290 4ae6c43-4ae6c47 1289->1290 1291 4ae6c51-4ae6c55 1289->1291 1290->1291 1293 4ae6c49 1290->1293 1294 4ae6c57-4ae6c5b 1291->1294 1295 4ae6c65-4ae6c69 1291->1295 1292->1289 1293->1291 1294->1295 1296 4ae6c5d 1294->1296 1297 4ae6c6b-4ae6c6f 1295->1297 1298 4ae6c79-4ae6c7d 1295->1298 1296->1295 1297->1298 1299 4ae6c71 1297->1299 1300 4ae6c7f-4ae6c83 1298->1300 1301 4ae6c8d 1298->1301 1299->1298 1300->1301 1302 4ae6c85 1300->1302 1303 4ae6c8e 1301->1303 1302->1301 1303->1303
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 172767ad2b84def98fce2dbcd98e9a3f33964c8391dc0a4dc84cd2f6873f61c9
                          • Instruction ID: 519cbc4dfd80603f71a722a1e324b4aa5d37435d63399393246ee419e8c5732d
                          • Opcode Fuzzy Hash: 172767ad2b84def98fce2dbcd98e9a3f33964c8391dc0a4dc84cd2f6873f61c9
                          • Instruction Fuzzy Hash: 09B16370E00209DFDF10CFAAD9857ADBBF2EF98314F548929D825E7254EB74A845CB81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 414 4c10040-4c100a3 417 4c100b2-4c100be 414->417 418 4c100a5 414->418 419 4c100c4-4c100c9 417->419 420 4c10bef 417->420 636 4c100ac call 4c12702 418->636 637 4c100ac call 4c1271b 418->637 421 4c100cb-4c100d4 419->421 422 4c100fc-4c10141 419->422 424 4c10bf4-4c10bf8 420->424 421->420 423 4c100da-4c100f7 421->423 422->420 443 4c10147-4c102bb 422->443 425 4c10d60-4c10d66 423->425 427 4c10bab-4c10bc2 424->427 428 4c10bfa 424->428 429 4c10d68-4c10d84 425->429 430 4c10d8d 425->430 454 4c10bcd-4c10be4 427->454 431 4c10c01-4c10c1e 428->431 432 4c10c23-4c10c6a 428->432 433 4c10cb8-4c10cfc 428->433 434 4c10c6f-4c10cb3 428->434 435 4c10cfe-4c10d24 428->435 429->430 445 4c10d8e 430->445 453 4c10d53-4c10d5b 431->453 432->453 433->453 434->453 455 4c10d26-4c10d3d 435->455 456 4c10d4d 435->456 484 4c102c1-4c102cd 443->484 485 4c10826-4c10857 443->485 445->445 453->425 454->420 455->420 464 4c10d43-4c10d4b 455->464 456->453 464->455 464->456 484->420 486 4c102d3-4c1035d 484->486 492 4c10859-4c10885 485->492 493 4c108bc-4c108ed 485->493 520 4c10385-4c103d4 486->520 521 4c1035f-4c10383 486->521 506 4c10887-4c1088a 492->506 507 4c1089f-4c108ba 492->507 504 4c108f3-4c10990 493->504 505 4c10a0f-4c10a57 493->505 554 4c109d2-4c109d5 504->554 555 4c10992-4c109d0 504->555 514 4c10ab4-4c10af8 505->514 515 4c10a59-4c10aae 505->515 506->507 509 4c1088c-4c1089c 506->509 507->492 507->493 509->507 535 4c10b84-4c10ba6 514->535 536 4c10afe-4c10b43 514->536 515->514 542 4c103e0-4c1041d 520->542 543 4c103d6-4c103db 520->543 521->520 535->425 536->454 553 4c10b49-4c10b51 536->553 560 4c10429-4c10465 542->560 561 4c1041f-4c10424 542->561 546 4c1080e-4c10820 543->546 546->484 546->485 553->420 559 4c10b57-4c10b5e 553->559 557 4c109d7-4c109e6 554->557 558 4c109e8 554->558 566 4c109f4-4c10a09 555->566 557->566 558->566 559->424 562 4c10b64-4c10b7e 559->562 574 4c10471-4c104b4 560->574 575 4c10467-4c1046c 560->575 561->546 562->535 562->536 566->504 566->505 579 4c104c0-4c10503 574->579 580 4c104b6-4c104bb 574->580 575->546 584 4c10505-4c1050a 579->584 585 4c1050f-4c10552 579->585 580->546 584->546 589 4c10554-4c10559 585->589 590 4c1055e-4c105a1 585->590 589->546 594 4c105a3-4c105a8 590->594 595 4c105ad-4c105e3 590->595 594->546 599 4c105e5-4c105ea 595->599 600 4c105ef-4c1062c 595->600 599->546 604 4c10638-4c1067b 600->604 605 4c1062e-4c10633 600->605 609 4c10687-4c106ca 604->609 610 4c1067d-4c10682 604->610 605->546 614 4c106d6-4c10719 609->614 615 4c106cc-4c106d1 609->615 610->546 619 4c10725-4c10768 614->619 620 4c1071b-4c10720 614->620 615->546 624 4c10774-4c107b7 619->624 625 4c1076a-4c1076f 619->625 620->546 629 4c107c0-4c10803 624->629 630 4c107b9-4c107be 624->630 625->546 634 4c10805-4c1080a 629->634 635 4c1080c 629->635 630->546 634->546 635->546 636->417 637->417
                          Strings
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 2$$cq
                          • API String ID: 0-1429447105
                          • Opcode ID: f80a3316ee1dcddccd80fcdc9d9fb5f531071723d4f40811e9422a32d9d3207c
                          • Instruction ID: 7857099c273b32fd68d51e56feac23a3817f4ade8a958a1a4ef73e8e07a54520
                          • Opcode Fuzzy Hash: f80a3316ee1dcddccd80fcdc9d9fb5f531071723d4f40811e9422a32d9d3207c
                          • Instruction Fuzzy Hash: F9720D74A006148FDB55DF65D894B9EBBF2FB89300F1085A9D80AD7365EB30AD89EF40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 638 acd3e0-acd461 VirtualProtect 641 acd46a-acd48f 638->641 642 acd463-acd469 638->642 642->641
                          APIs
                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 00ACD454
                          Memory Dump Source
                          • Source File: 00000007.00000002.3390326238.0000000000AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AC0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_ac0000_InstallUtil.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: e3ce4a96a6ea36f9c799dc2fff606bc94c5e98e84bdf8c877dbf7e1de3dd9ebc
                          • Instruction ID: a92d951156ef38f34ac4a71b40ed2d5fa3eb1de76f5ecc955647ee6e0cd6a97d
                          • Opcode Fuzzy Hash: e3ce4a96a6ea36f9c799dc2fff606bc94c5e98e84bdf8c877dbf7e1de3dd9ebc
                          • Instruction Fuzzy Hash: 911124B1D002498FDB10DFAAC884AAEFBF4EF48320F14842AD519A7200CB75A944CFA0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 646 acd5b0-acd61f FindCloseChangeNotification 649 acd628-acd64d 646->649 650 acd621-acd627 646->650 650->649
                          APIs
                          • FindCloseChangeNotification.KERNELBASE ref: 00ACD612
                          Memory Dump Source
                          • Source File: 00000007.00000002.3390326238.0000000000AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AC0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_ac0000_InstallUtil.jbxd
                          Similarity
                          • API ID: ChangeCloseFindNotification
                          • String ID:
                          • API String ID: 2591292051-0
                          • Opcode ID: 0fba4ce8b9e9ff123dea6f0599777612c40430b2875d3b78f6fe2ec3052e523c
                          • Instruction ID: 56fe86d1aa9f07cdb97548d2ad0bac09bf2eac1bceafed6f5ccfdf5e6a2e662f
                          • Opcode Fuzzy Hash: 0fba4ce8b9e9ff123dea6f0599777612c40430b2875d3b78f6fe2ec3052e523c
                          • Instruction Fuzzy Hash: BB113AB1D002498FDB20DFAAC8457EEFBF5EF88324F14842DD519A7240CB756944CBA4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 654 4ae0c62-4ae0c95 655 4ae0cfe-4ae0d05 654->655 656 4ae0c97-4ae0cf5 654->656 657 4ae0d0b-4ae0d72 655->657 658 4ae0de6-4ae0df7 655->658 718 4ae0cf8 call 4ae0fb8 656->718 719 4ae0cf8 call 4ae0fc8 656->719 720 4ae0cf8 call 4ae0c62 656->720 721 4ae0cf8 call 4ae0f30 656->721 692 4ae0d74-4ae0db3 657->692 693 4ae0de0 657->693 660 4ae0dfe-4ae0e21 658->660 661 4ae0df9 658->661 668 4ae0e93-4ae0f2e 660->668 669 4ae0e23-4ae0e2c 660->669 661->660 681 4ae0f4f-4ae0f55 668->681 671 4ae0e2e-4ae0e33 669->671 672 4ae0e3b-4ae0e41 669->672 671->672 676 4ae0f4a 672->676 677 4ae0e47-4ae0e4e 672->677 676->681 677->668 679 4ae0e50-4ae0e59 677->679 683 4ae0e5b-4ae0e60 679->683 684 4ae0e68-4ae0e6e 679->684 685 4ae0f5f 681->685 686 4ae0f57 681->686 683->684 684->676 688 4ae0e74-4ae0e8e 684->688 691 4ae0f96-4ae100d call ace120 685->691 686->685 688->681 717 4ae1012-4ae1016 691->717 707 4ae0dd6-4ae0dda 692->707 708 4ae0db5-4ae0dc5 692->708 693->658 707->691 707->693 714 4ae0dc7-4ae0dce 708->714 715 4ae0dd0-4ae0dd4 708->715 714->707 715->707 715->708 718->655 719->655 720->655 721->655
                          Strings
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: Djq
                          • API String ID: 0-3204991199
                          • Opcode ID: 089251d7d327c3afa672dcce70456bdbc088927db20c16af188601e7d88e2a8d
                          • Instruction ID: 22893f2dccd387019c4a6d6772d646146b286fc1ba3c44b9a5261014d56d1eaa
                          • Opcode Fuzzy Hash: 089251d7d327c3afa672dcce70456bdbc088927db20c16af188601e7d88e2a8d
                          • Instruction Fuzzy Hash: FEA1CF706046148FC714EF6AD894A6EBBF2FF89310F158569E4159B3A6DB70EC06CB90

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 853 4ae5d1c-4ae5d8e 855 4ae5dd8-4ae5dda 853->855 856 4ae5d90-4ae5d9b 853->856 858 4ae5ddc-4ae5e34 855->858 856->855 857 4ae5d9d-4ae5da9 856->857 859 4ae5dcc-4ae5dd6 857->859 860 4ae5dab-4ae5db5 857->860 867 4ae5e7e-4ae5e80 858->867 868 4ae5e36-4ae5e41 858->868 859->858 862 4ae5db9-4ae5dc8 860->862 863 4ae5db7 860->863 862->862 864 4ae5dca 862->864 863->862 864->859 870 4ae5e82-4ae5e9a 867->870 868->867 869 4ae5e43-4ae5e4f 868->869 871 4ae5e72-4ae5e7c 869->871 872 4ae5e51-4ae5e5b 869->872 876 4ae5e9c-4ae5ea7 870->876 877 4ae5ee4-4ae5ee6 870->877 871->870 873 4ae5e5f-4ae5e6e 872->873 874 4ae5e5d 872->874 873->873 878 4ae5e70 873->878 874->873 876->877 879 4ae5ea9-4ae5eb5 876->879 880 4ae5ee8-4ae5efa 877->880 878->871 881 4ae5ed8-4ae5ee2 879->881 882 4ae5eb7-4ae5ec1 879->882 887 4ae5f01-4ae5f36 880->887 881->880 883 4ae5ec5-4ae5ed4 882->883 884 4ae5ec3 882->884 883->883 886 4ae5ed6 883->886 884->883 886->881 888 4ae5f3c-4ae5f4a 887->888 889 4ae5f4c-4ae5f52 888->889 890 4ae5f53-4ae5fb3 888->890 889->890 897 4ae5fb5-4ae5fb9 890->897 898 4ae5fc3-4ae5fc7 890->898 897->898 901 4ae5fbb 897->901 899 4ae5fc9-4ae5fcd 898->899 900 4ae5fd7-4ae5fdb 898->900 899->900 902 4ae5fcf 899->902 903 4ae5fdd-4ae5fe1 900->903 904 4ae5feb-4ae5fef 900->904 901->898 902->900 903->904 905 4ae5fe3 903->905 906 4ae5fff-4ae6003 904->906 907 4ae5ff1-4ae5ff5 904->907 905->904 909 4ae6005-4ae6009 906->909 910 4ae6013-4ae6017 906->910 907->906 908 4ae5ff7 907->908 908->906 909->910 913 4ae600b 909->913 911 4ae6019-4ae601d 910->911 912 4ae6027 910->912 911->912 914 4ae601f 911->914 915 4ae6028 912->915 913->910 914->912 915->915
                          Strings
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: \VNl
                          • API String ID: 0-3796923132
                          • Opcode ID: 81bb0c9eda6f42e68f2c9a8764d2c3d5570f1292d83746b338336ad4d688e756
                          • Instruction ID: da35865f502cbcc317c6dc2617735361f7415caa1f6f1e6e1ede59b277b13895
                          • Opcode Fuzzy Hash: 81bb0c9eda6f42e68f2c9a8764d2c3d5570f1292d83746b338336ad4d688e756
                          • Instruction Fuzzy Hash: AE914170E00209AFDF14CFEAD9857EDBBF2AF48318F148529E415A7294EB74A845CF91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 984 4c1271b-4c12766 1011 4c12768 call 4c12950 984->1011 1012 4c12768 call 4c12960 984->1012 990 4c1276e-4c127b9 995 4c127c5-4c1288e 990->995 996 4c127bb-4c127bf 990->996 1010 4c12896-4c1289a 995->1010 996->995 1011->990 1012->990
                          Strings
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq
                          • API String ID: 0-2449534970
                          • Opcode ID: fa2794b591a48a0dcca30bc86f5e0859ecc9653a9181f4596d46116ea6e3b09f
                          • Instruction ID: bf1c1c6c0b89d12782e62fdd243bb8ca65338c38228af70c5d1835fc230f7d98
                          • Opcode Fuzzy Hash: fa2794b591a48a0dcca30bc86f5e0859ecc9653a9181f4596d46116ea6e3b09f
                          • Instruction Fuzzy Hash: AB31A1317002104BC369AF69E028B3F37D2EBCA791F158528E8079B3A9DE309D0E57D6

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1013 4c114e0-4c114e9 1014 4c114f2-4c1150f 1013->1014 1015 4c114eb 1013->1015 1017 4c11511-4c1151b 1014->1017 1018 4c11526-4c1153b 1014->1018 1015->1014 1019 4c11521-4c11523 1017->1019 1020 4c1192b-4c11999 1017->1020 1023 4c11541-4c115f7 1018->1023 1024 4c11650-4c11654 1018->1024 1019->1018 1027 4c119e9-4c119ee 1020->1027 1028 4c1199b-4c119a1 1020->1028 1023->1024 1086 4c115f9-4c11603 1023->1086 1025 4c117ea-4c11823 1024->1025 1026 4c1165a-4c11660 1024->1026 1047 4c11829-4c11896 1025->1047 1048 4c1191b-4c11928 1025->1048 1029 4c11663-4c11665 1026->1029 1030 4c11662 1026->1030 1031 4c119f1-4c11a1a 1027->1031 1028->1031 1032 4c119a3-4c119c6 1028->1032 1035 4c117db-4c117e4 1029->1035 1030->1029 1042 4c11a20-4c11a34 1031->1042 1043 4c11e2f-4c11e4d 1031->1043 1052 4c119ce-4c119d1 1032->1052 1035->1025 1039 4c11676-4c1167f 1035->1039 1039->1020 1041 4c11685-4c116df 1039->1041 1074 4c116e5-4c11717 1041->1074 1075 4c117da 1041->1075 1044 4c11a36 1042->1044 1045 4c11a3b-4c11af2 1042->1045 1056 4c12267-4c12273 1043->1056 1044->1045 1136 4c11d71-4c11d95 1045->1136 1137 4c11af8-4c11b00 1045->1137 1047->1048 1080 4c1189c-4c118a9 1047->1080 1057 4c12279-4c1228d 1056->1057 1058 4c11e5b-4c11e67 1056->1058 1062 4c12254-4c12259 1058->1062 1063 4c11e6d-4c11eed 1058->1063 1073 4c12264 1062->1073 1110 4c11f05-4c11f1e 1063->1110 1111 4c11eef-4c11ef5 1063->1111 1073->1056 1074->1020 1092 4c1171d-4c11722 1074->1092 1075->1035 1080->1020 1085 4c118af-4c118fb 1080->1085 1099 4c1190d-4c11919 1085->1099 1100 4c118fd-4c11903 1085->1100 1086->1024 1091 4c11605-4c11649 1086->1091 1091->1024 1097 4c117c4-4c117cd 1092->1097 1098 4c11728-4c11761 1092->1098 1097->1020 1101 4c117d3-4c117d5 1097->1101 1112 4c11763-4c1176f 1098->1112 1113 4c11792-4c117a1 1098->1113 1099->1048 1100->1099 1106 4c117d9 1101->1106 1106->1075 1123 4c11f20-4c11f56 1110->1123 1124 4c11f5b-4c11f99 1110->1124 1116 4c11ef7 1111->1116 1117 4c11ef9-4c11efb 1111->1117 1112->1020 1118 4c11775-4c11790 1112->1118 1113->1020 1114 4c117a7-4c117c2 1113->1114 1114->1106 1116->1110 1117->1110 1118->1106 1123->1073 1145 4c11f9b-4c11fbc 1124->1145 1146 4c11fbe-4c11fcb 1124->1146 1147 4c11e19-4c11e1f 1136->1147 1138 4c11b02-4c11b06 1137->1138 1139 4c11b07-4c11b0f 1137->1139 1138->1139 1142 4c11b11 1139->1142 1143 4c11b14-4c11b36 1139->1143 1142->1143 1153 4c11b38 1143->1153 1154 4c11b3b-4c11b41 1143->1154 1159 4c11fd2-4c11fd8 1145->1159 1146->1159 1149 4c11e21 1147->1149 1150 4c11e2c 1147->1150 1149->1150 1158 4c11e2d 1150->1158 1153->1154 1156 4c11b47-4c11b61 1154->1156 1157 4c11cfb-4c11d06 1154->1157 1160 4c11ba1-4c11baa 1156->1160 1161 4c11b63-4c11b67 1156->1161 1164 4c11d08 1157->1164 1165 4c11d0b-4c11d41 1157->1165 1158->1158 1162 4c11ff7-4c12049 1159->1162 1163 4c11fda-4c11ff5 1159->1163 1167 4c11bb0-4c11bc0 1160->1167 1168 4c11e14 1160->1168 1161->1160 1169 4c11b69-4c11b71 1161->1169 1204 4c12164-4c121a3 1162->1204 1205 4c1204f-4c12054 1162->1205 1163->1162 1164->1165 1200 4c11d43-4c11d67 1165->1200 1201 4c11d69 1165->1201 1167->1168 1172 4c11bc6-4c11bd7 1167->1172 1168->1147 1173 4c11b77 1169->1173 1174 4c11bfa-4c11c93 1169->1174 1172->1168 1176 4c11bdd-4c11bed 1172->1176 1177 4c11b7a-4c11b7c 1173->1177 1185 4c11c99-4c11c9d 1174->1185 1186 4c11d9a-4c11dae 1174->1186 1176->1168 1181 4c11bf3-4c11bf8 1176->1181 1182 4c11b81-4c11b8c 1177->1182 1183 4c11b7e 1177->1183 1181->1174 1182->1168 1187 4c11b92-4c11b9d 1182->1187 1183->1182 1185->1186 1190 4c11ca3-4c11cb1 1185->1190 1186->1168 1192 4c11db0-4c11dca 1186->1192 1187->1177 1188 4c11b9f 1187->1188 1188->1174 1193 4c11cf1-4c11cf5 1190->1193 1194 4c11cb3 1190->1194 1192->1168 1195 4c11dcc-4c11de9 1192->1195 1193->1156 1193->1157 1197 4c11cb9-4c11cbb 1194->1197 1195->1168 1199 4c11deb-4c11e09 1195->1199 1202 4c11cc5-4c11ce1 1197->1202 1203 4c11cbd-4c11cc1 1197->1203 1199->1168 1206 4c11e0b 1199->1206 1200->1201 1201->1136 1202->1168 1207 4c11ce7-4c11cef 1202->1207 1203->1202 1219 4c121a5-4c121bd 1204->1219 1220 4c121bf-4c121ce 1204->1220 1209 4c1205e-4c12061 1205->1209 1206->1168 1207->1193 1207->1197 1211 4c12067 1209->1211 1212 4c1212c-4c12154 1209->1212 1215 4c120d0-4c120fc 1211->1215 1216 4c1209f-4c120cb 1211->1216 1217 4c1206e-4c1209a 1211->1217 1218 4c120fe-4c1212a 1211->1218 1221 4c1215a-4c1215e 1212->1221 1215->1221 1216->1221 1217->1221 1218->1221 1222 4c121d7-4c12239 1219->1222 1220->1222 1221->1204 1221->1209 1230 4c12244-4c12252 1222->1230 1230->1073
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 52bb3d49f7e2442ce08b45538c33c4422a481c6ad0264f7cd85110f535d07f21
                          • Instruction ID: 7122f0585acdd1996c85ef5a58798d75f0d5aff9268ed613b19c9fc7fd8e8933
                          • Opcode Fuzzy Hash: 52bb3d49f7e2442ce08b45538c33c4422a481c6ad0264f7cd85110f535d07f21
                          • Instruction Fuzzy Hash: 38E12A74A002188FCB55DF69C888A99BBF2FF89310F1580E5D409DB365EB34AE86DF41

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1304 4ae6934-4ae69a6 1306 4ae69a8-4ae69b3 1304->1306 1307 4ae69f0-4ae69f2 1304->1307 1306->1307 1308 4ae69b5-4ae69c1 1306->1308 1309 4ae69f4-4ae6a0d 1307->1309 1310 4ae69e4-4ae69ee 1308->1310 1311 4ae69c3-4ae69cd 1308->1311 1316 4ae6a0f-4ae6a1b 1309->1316 1317 4ae6a59-4ae6a5b 1309->1317 1310->1309 1312 4ae69cf 1311->1312 1313 4ae69d1-4ae69e0 1311->1313 1312->1313 1313->1313 1315 4ae69e2 1313->1315 1315->1310 1316->1317 1318 4ae6a1d-4ae6a29 1316->1318 1319 4ae6a5d-4ae6a75 1317->1319 1320 4ae6a4c-4ae6a57 1318->1320 1321 4ae6a2b-4ae6a35 1318->1321 1326 4ae6abf-4ae6ac1 1319->1326 1327 4ae6a77-4ae6a82 1319->1327 1320->1319 1323 4ae6a39-4ae6a48 1321->1323 1324 4ae6a37 1321->1324 1323->1323 1325 4ae6a4a 1323->1325 1324->1323 1325->1320 1328 4ae6ac3-4ae6adb 1326->1328 1327->1326 1329 4ae6a84-4ae6a90 1327->1329 1335 4ae6add-4ae6ae8 1328->1335 1336 4ae6b25-4ae6b27 1328->1336 1330 4ae6a92-4ae6a9c 1329->1330 1331 4ae6ab3-4ae6abd 1329->1331 1332 4ae6a9e 1330->1332 1333 4ae6aa0-4ae6aaf 1330->1333 1331->1328 1332->1333 1333->1333 1337 4ae6ab1 1333->1337 1335->1336 1338 4ae6aea-4ae6af6 1335->1338 1339 4ae6b29-4ae6b5f 1336->1339 1337->1331 1340 4ae6af8-4ae6b02 1338->1340 1341 4ae6b19-4ae6b23 1338->1341 1347 4ae6b67-4ae6b9c 1339->1347 1342 4ae6b06-4ae6b15 1340->1342 1343 4ae6b04 1340->1343 1341->1339 1342->1342 1345 4ae6b17 1342->1345 1343->1342 1345->1341 1348 4ae6ba2-4ae6bb0 1347->1348 1349 4ae6bb9-4ae6c19 1348->1349 1350 4ae6bb2-4ae6bb8 1348->1350 1357 4ae6c1b-4ae6c1f 1349->1357 1358 4ae6c29-4ae6c2d 1349->1358 1350->1349 1357->1358 1359 4ae6c21 1357->1359 1360 4ae6c2f-4ae6c33 1358->1360 1361 4ae6c3d-4ae6c41 1358->1361 1359->1358 1360->1361 1364 4ae6c35 1360->1364 1362 4ae6c43-4ae6c47 1361->1362 1363 4ae6c51-4ae6c55 1361->1363 1362->1363 1365 4ae6c49 1362->1365 1366 4ae6c57-4ae6c5b 1363->1366 1367 4ae6c65-4ae6c69 1363->1367 1364->1361 1365->1363 1366->1367 1368 4ae6c5d 1366->1368 1369 4ae6c6b-4ae6c6f 1367->1369 1370 4ae6c79-4ae6c7d 1367->1370 1368->1367 1369->1370 1371 4ae6c71 1369->1371 1372 4ae6c7f-4ae6c83 1370->1372 1373 4ae6c8d 1370->1373 1371->1370 1372->1373 1374 4ae6c85 1372->1374 1375 4ae6c8e 1373->1375 1374->1373 1375->1375
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 420e6bad98d57ab884fe171b8d11280bb27e480fb2f3e245ddfdcea5a8b4e5b5
                          • Instruction ID: c272a60b7fac37ba4061120aa6acb5d4ece2143953124bcaa0a11fedc36ee810
                          • Opcode Fuzzy Hash: 420e6bad98d57ab884fe171b8d11280bb27e480fb2f3e245ddfdcea5a8b4e5b5
                          • Instruction Fuzzy Hash: 81A17270E00209DFDB10DFAAD9857EDBBF1EF98314F548929D824E7254EB74A845CB81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1376 4c1e0e0-4c1e3b7 1378 4c1e3c3-4c1e9bc 1376->1378 1380 4c1edc8-4c1edca 1378->1380 1381 4c1edd0-4c1efcb 1380->1381 1382 4c1e7f4-4c1eb72 1380->1382 1381->1382 1385 4c1e121-4c1e144 1382->1385 1386 4c1eb78 1382->1386 1411 4c1e184-4c1e18d 1385->1411 1412 4c1e146-4c1e182 1385->1412 1387 4c1ea89-4c1ea8c 1386->1387 1388 4c1ec78-4c1ec7b 1386->1388 1389 4c1ee6a-4c1ee6d 1386->1389 1391 4c1ea92 1387->1391 1392 4c1f064-4c1f067 1387->1392 1394 4c1ec81 1388->1394 1395 4c1f009-4c1f013 1388->1395 1396 4c1eb23-4c1eb26 1389->1396 1397 4c1ee73 1389->1397 1391->1396 1398 4c1ee47-4c1ee4d 1392->1398 1399 4c1f06d 1392->1399 1394->1380 1395->1385 1400 4c1e913-4c1e919 1396->1400 1401 4c1eb2c-4c1f01b 1396->1401 1409 4c1ef49-4c1ef6e 1397->1409 1404 4c1ee5b-4c1ee5f 1398->1404 1405 4c1ee4f-4c1ee51 1398->1405 1413 4c1f0c9-4c1f25f 1399->1413 1407 4c1e927-4c1e92b 1400->1407 1408 4c1e91b-4c1e91d 1400->1408 1401->1413 1418 4c1f021 1401->1418 1414 4c1ee65 1404->1414 1415 4c1e34d-4c1e367 1404->1415 1405->1404 1407->1409 1417 4c1e931-4c1edff 1407->1417 1408->1407 1431 4c1e112-4c1e118 1409->1431 1432 4c1ef74-4c1ef79 1409->1432 1412->1411 1414->1389 1415->1385 1417->1431 1437 4c1ee05-4c1ee0a 1417->1437 1418->1392 1431->1385 1436 4c1e11a 1431->1436 1432->1431 1436->1385 1440 4c1e4e2-4c1e4ec 1436->1440 1437->1431 1440->1385
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5b7fda9951af87d7f5cbe17e2174765c2d65895aa4a17ef603b834da5a5b3d3a
                          • Instruction ID: fa017c520b57858d1cb1c79662f628dd35d964133a7802e11b3ffdafbb1deffe
                          • Opcode Fuzzy Hash: 5b7fda9951af87d7f5cbe17e2174765c2d65895aa4a17ef603b834da5a5b3d3a
                          • Instruction Fuzzy Hash: B4916F74F002288BCB58AFB6945866D7BA3BBC6341F644829E906D73D1DE30A945AB05
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cd608a81b30ebcb029249d53e97f2563e47d1b27a0449d83358ec2b9aa26d5ad
                          • Instruction ID: 21a7a11ae291fd04a3b9e4f72b7da17dfd9a32f7e98b828abfcd84af6443c071
                          • Opcode Fuzzy Hash: cd608a81b30ebcb029249d53e97f2563e47d1b27a0449d83358ec2b9aa26d5ad
                          • Instruction Fuzzy Hash: 3F510531A092548FCB11DF75C850AADBBB2FF46304F1488D9D445AB366E731AE06DF81
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0eebec550efe531574955af8fb025c5d270e90e0cfa28ac849c71fbe14bb1909
                          • Instruction ID: 636c430a256095a85480bb4a64f8050cdc36f0da26ee4a3e2b5149c5bcb86edf
                          • Opcode Fuzzy Hash: 0eebec550efe531574955af8fb025c5d270e90e0cfa28ac849c71fbe14bb1909
                          • Instruction Fuzzy Hash: 6C41F4B0D003499FDB10DF99C884AEEBFF5FF49314F148429E819AB215DB75A945CB90
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2345e178383164383e378bc3997f60f58f49bcd24e0a6e951f3f8cedfb2b4aa7
                          • Instruction ID: 6583e9edc55f6d31e67afb856e38dc1f968ea2468b230057a9eb8d64a51a1c3d
                          • Opcode Fuzzy Hash: 2345e178383164383e378bc3997f60f58f49bcd24e0a6e951f3f8cedfb2b4aa7
                          • Instruction Fuzzy Hash: 4041EEB0D002499FDB10DF9AC884AAEBFF5FF48310F208029E819AB254DB75A945CB90
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1ce47a45b0549e2e00c32a9c4e56549eb3348cff6b281f847bc46d40bad51dd5
                          • Instruction ID: 5b16e453a3a74a522e889da698704f5821103a42fce390f415fd37f6f33b4033
                          • Opcode Fuzzy Hash: 1ce47a45b0549e2e00c32a9c4e56549eb3348cff6b281f847bc46d40bad51dd5
                          • Instruction Fuzzy Hash: 503110709083848FC712DF69C854B9A7FB2EF46300F0580EAD441DB2A2DB34A98ADF81
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b3e26b5e67db413abaf68800bdbed960fc892fb871bf3734b988eb2a11a5e9e8
                          • Instruction ID: 8751da1aed902bd2b91626c96b0e11e07363e9ff8a2c2ce5fed4aafbe1f65c39
                          • Opcode Fuzzy Hash: b3e26b5e67db413abaf68800bdbed960fc892fb871bf3734b988eb2a11a5e9e8
                          • Instruction Fuzzy Hash: F0413AB4E00228CFCB24DF59C854AA9B7B2FF89304F1084D6D809A7365DB30AE81EF54
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b89048dfc127d5dbc4ab02bfb9db903803fdb521e2e574b9877fd71d7457fb62
                          • Instruction ID: 166bc55a8fce4c5b20e5858866c3f1391f62218d141d3f3aa2dae332b7a22bd5
                          • Opcode Fuzzy Hash: b89048dfc127d5dbc4ab02bfb9db903803fdb521e2e574b9877fd71d7457fb62
                          • Instruction Fuzzy Hash: AE212F74E00218CFC754EF25C854A99B7B2FF89304F1085E9E80AA7365DB316E85DF40
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f5702913b117cde5b2fdd9e1fdbe7df87233df4512952dbe213dc2250d3f4d04
                          • Instruction ID: 582f817eab80cdeabf72a57946dd625eb39b2535381eec854b3de3409b94ec33
                          • Opcode Fuzzy Hash: f5702913b117cde5b2fdd9e1fdbe7df87233df4512952dbe213dc2250d3f4d04
                          • Instruction Fuzzy Hash: 8D114538B04205CFD708CF65D598968B7B3EB8A304B1884A6E41A9B231EB31FD44FF14
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 761ba27d395cf8158752730a4a78bcc8ec8c863dbafcac57beaea9a1591b0efd
                          • Instruction ID: 0f737688f5d2b14b8b666e395edfcb303e8989a73e90c215a4ac0a261b1c8b3e
                          • Opcode Fuzzy Hash: 761ba27d395cf8158752730a4a78bcc8ec8c863dbafcac57beaea9a1591b0efd
                          • Instruction Fuzzy Hash: C511E7719083C18FD7128B64C0949947FB2EF43344B4A89DAC8958B577DB74F807EB46
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1e03f129242e612b8ec750aecfefe51c8f347ff309e9cb23b080534c4dc44dc4
                          • Instruction ID: d9582ac1cf2717d182c3665b9470a3b2e9254323d7cc01cfeccbb7a14b0a1213
                          • Opcode Fuzzy Hash: 1e03f129242e612b8ec750aecfefe51c8f347ff309e9cb23b080534c4dc44dc4
                          • Instruction Fuzzy Hash: E0F02D702047914FC716E77AD86056B3B57DFC12157448F2ED0494B5A2DB30994A9794
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7f2e9b198391aee8dee8b405650c5c5a2f6abd9892c287049f1f0adcb835e306
                          • Instruction ID: 661523895a09b81297526b807aeedb4b9453e3eb8d5a1d4dfbe38a4d95c77bd8
                          • Opcode Fuzzy Hash: 7f2e9b198391aee8dee8b405650c5c5a2f6abd9892c287049f1f0adcb835e306
                          • Instruction Fuzzy Hash: E0F082613082541FD309567A1C25B6B6F9ADFC6650F1A84AEA548CB2A7CC658C4643A1
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 13fcaddc9e6bebb278bec553e7e30e4b520a95a9090fbc039e5595da181783dd
                          • Instruction ID: 8b82a1156084e54ebb7d96d5a9f870d49369f052979a1ead4d133659bc2fa5fe
                          • Opcode Fuzzy Hash: 13fcaddc9e6bebb278bec553e7e30e4b520a95a9090fbc039e5595da181783dd
                          • Instruction Fuzzy Hash: 09015E74A042288FCB51DF29C864AAA7BF2FF89304F0481D9D409973A6D7346D45DF44
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fcb35cd232f9fbdd07dbcd81cd51ffea83297cb7ce9ae96f94c8759021d4b40c
                          • Instruction ID: 0b96cc3982e9800306d7519b5b5eee3fd288ef2a58585c3351546a960176e83a
                          • Opcode Fuzzy Hash: fcb35cd232f9fbdd07dbcd81cd51ffea83297cb7ce9ae96f94c8759021d4b40c
                          • Instruction Fuzzy Hash: 4CF09E712047000FC71AE739D82056B3767DFC13513418F2AE0598F2D2CF348D0A4790
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5077779467bf23033098134d754ac210687a37e13122b109ac5c910be4468409
                          • Instruction ID: d2c3a5e47045cbbb8c8217ac9f829df6baa2ffc5729bf95526ae0d5efd2046c4
                          • Opcode Fuzzy Hash: 5077779467bf23033098134d754ac210687a37e13122b109ac5c910be4468409
                          • Instruction Fuzzy Hash: CFE09A613002182BD308667B1C26B2BAA8EEBC57A0F64C02EB609CB386CC618C0203E0
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c33150c4e32ae6616fbc3255de4132098a06d81776899f096395bcd0f9f9eade
                          • Instruction ID: a5a9bd98059aa1d7f2258f40c505bda014c30667a25f168482a1e012dc7b15d8
                          • Opcode Fuzzy Hash: c33150c4e32ae6616fbc3255de4132098a06d81776899f096395bcd0f9f9eade
                          • Instruction Fuzzy Hash: 2EE0E570200B000BC619F77AE820A6F775ADFC0361780CF29E11A0B182CF70A94A57D4
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 476e9c706562ad2fda4b76144f7569a462271fddde3c1378f80fe10ec74ea06e
                          • Instruction ID: 7d53af7e08f5b5c8312046847b011e1cc959a6821188d9ea99b37a2136c33ef7
                          • Opcode Fuzzy Hash: 476e9c706562ad2fda4b76144f7569a462271fddde3c1378f80fe10ec74ea06e
                          • Instruction Fuzzy Hash: 34F096B4908124CFCB51CF25C858965B7B2FF4E308F1440D9D80EAB399D7356A45DF50
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2884c9d258f5732120e230cee891d5c43eb99681f165f680f7ecbdfafddb7544
                          • Instruction ID: 559ebc1703df408e27906812d255ddb43b4181f93e82720949441fba22aee4da
                          • Opcode Fuzzy Hash: 2884c9d258f5732120e230cee891d5c43eb99681f165f680f7ecbdfafddb7544
                          • Instruction Fuzzy Hash: 8DF0B674E00268CFCB64DF14D854698B7B1EB89311F1081E5D909A7750DB309E95DF45
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f2ae3f7680ecc319476b5637a93f03b54ed3ca62195c5463242cce837a46d807
                          • Instruction ID: 53a9f69bacf2854ad11d2d2586ea54fd8b2ea795e5fce46005857938000fd7f4
                          • Opcode Fuzzy Hash: f2ae3f7680ecc319476b5637a93f03b54ed3ca62195c5463242cce837a46d807
                          • Instruction Fuzzy Hash: DAF0CF34B00228DFDB20CB95C850BA9BBB1AF49300F184099E5266B291E371A981DF12
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6d3c024a25f6506d5b4b9c55fb1a69b3b121a8634794155a482022449d4431f8
                          • Instruction ID: 2702a61a53a9b3122769371a1a1d38364028cc0001489880d38a2ea02eb4d265
                          • Opcode Fuzzy Hash: 6d3c024a25f6506d5b4b9c55fb1a69b3b121a8634794155a482022449d4431f8
                          • Instruction Fuzzy Hash: A7E0DF213081D07FC30246AC68209FAABBDDBC625130640AFF989D3642C9002C1A9364
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bc07e4dee4e356be76400756c76bca5060904d5b78603fd0eb32d1b59d4633d1
                          • Instruction ID: 01f4d8ebb4dad4ef0bd0b3af2e18a00f713148459b29445c2b8dcc0dc237fd3d
                          • Opcode Fuzzy Hash: bc07e4dee4e356be76400756c76bca5060904d5b78603fd0eb32d1b59d4633d1
                          • Instruction Fuzzy Hash: 9FD05E5620E2D46FD76292BB6CA4EF77F79DF83168B0800EBD0D496022A011201FFBA1
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b1ab721e953ac7459418f9418420eeb3fae0bdfd9610de2793c9e8b5e91b8ec0
                          • Instruction ID: f3b563e7eb8f29e94b259685373c8450383ff5e4caf0f70ac1d247967741b96f
                          • Opcode Fuzzy Hash: b1ab721e953ac7459418f9418420eeb3fae0bdfd9610de2793c9e8b5e91b8ec0
                          • Instruction Fuzzy Hash: C3D0A732310124778100659EE810A97B3DED7C9661741403BFA0DC3340CA50AC0443F4
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2e496f5985a40b74da01720db6611e4a83aaca5e620c023f95f71587ca7a6aa1
                          • Instruction ID: 7c9acd203a13ad0e6998f7a0fcdb7208890b5842ba091866adf695e42abd29c5
                          • Opcode Fuzzy Hash: 2e496f5985a40b74da01720db6611e4a83aaca5e620c023f95f71587ca7a6aa1
                          • Instruction Fuzzy Hash: AEE08630D0D289EFE751CF75AC460B97F76AA4221471885E6DC09D6061F2312A19B650
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 88c236d7c4c8fed315ba67f99780de4113aca5aafc703929d86bf0287de59a0c
                          • Instruction ID: b42c9c794ebaf693d93b1596c5faec68b0674f926dabc260d85457ffef7e2899
                          • Opcode Fuzzy Hash: 88c236d7c4c8fed315ba67f99780de4113aca5aafc703929d86bf0287de59a0c
                          • Instruction Fuzzy Hash: 94E04634200286CFE3048B04C6C89917BB7AE0A30830E80E0CC850B232EB30F906FA94
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8d2d7ec6a1a0364af25334f852aadc383868e4db907dc6fc59e29c7c645f89ca
                          • Instruction ID: e02d89de49370e5eea601f7fba6e7936af2aaba5aa4e6d9287545a342eaaddf4
                          • Opcode Fuzzy Hash: 8d2d7ec6a1a0364af25334f852aadc383868e4db907dc6fc59e29c7c645f89ca
                          • Instruction Fuzzy Hash: 1FD0A73054C2C45FC357C3B898A28D6BF70EE87114308C4EEE4CC8B213CA12A90BCB10
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6a3194e24353fb0be83549b10099109e843abdb8b46c65ba856b760204416efb
                          • Instruction ID: 92f80db35592e638da61a0c870ee1b1e55e82c43b4c3b70378a826fbeab445ac
                          • Opcode Fuzzy Hash: 6a3194e24353fb0be83549b10099109e843abdb8b46c65ba856b760204416efb
                          • Instruction Fuzzy Hash: 79D0C9353081801FC70982AC98B18A97FF68ECB61831AC4E9A8CCCB773E662DC038250
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 74e7223376314929f78e680c903407144bf0d9d1d6041b0e481b058236557b7f
                          • Instruction ID: e8d18338822fd5ce69daf14bc11ce8127795d1c33581989ff636e63123941e53
                          • Opcode Fuzzy Hash: 74e7223376314929f78e680c903407144bf0d9d1d6041b0e481b058236557b7f
                          • Instruction Fuzzy Hash: 2DD05E72C01108AECB01DBF089028EE7BB9DB46200B5005EAD804E7211ED315A04AF40
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a4c0ecd05d2ba770842388997b5aaec4935e40d2d1898afd41d908047e73ef68
                          • Instruction ID: d8085ac12c4ef834560b92d6a86c63c0f4a4eebfccb120c85b064bfc63071b7c
                          • Opcode Fuzzy Hash: a4c0ecd05d2ba770842388997b5aaec4935e40d2d1898afd41d908047e73ef68
                          • Instruction Fuzzy Hash: A6D012302945846FC7418B79D8A4CE53FFCDE8B55470900D5F4C8DB533C116681BDB11
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9e91962775e4fdbfaa2423475ccb142f5aa4a38fad605e59c061f259b98d191e
                          • Instruction ID: a00fab178b953e60c57fb454d88bfcd8e73dff5c3dbe6880cf8e6ec4d340a220
                          • Opcode Fuzzy Hash: 9e91962775e4fdbfaa2423475ccb142f5aa4a38fad605e59c061f259b98d191e
                          • Instruction Fuzzy Hash: FCD0A730E0C308EBB700CF66CC05069B7BFAA41118714C5E2D80A93130F7312A10B650
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 15a1e1a4555f35315a0ebc4b4316413a1f32eb319c8f57a1167c041af5821ef6
                          • Instruction ID: 1044f6205d9825b9042800c10f68a45d0ec012eac50d47c682142b8c19b657d4
                          • Opcode Fuzzy Hash: 15a1e1a4555f35315a0ebc4b4316413a1f32eb319c8f57a1167c041af5821ef6
                          • Instruction Fuzzy Hash: 9DD05E72C01208AFCB00EFF0C90148E7BECEB0520078044AAE904D3211EA319A00AB81
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ee445884bfcb89a3ddbf56d52e70048a938d2140410f78e24785ad8a0e2c5b02
                          • Instruction ID: 883532ab0d492e3e0c2e9d7143bedce8c9233145afec65da40a6ffd67270b702
                          • Opcode Fuzzy Hash: ee445884bfcb89a3ddbf56d52e70048a938d2140410f78e24785ad8a0e2c5b02
                          • Instruction Fuzzy Hash: 85D0C772D0110CAF8B01EFF4C90149E77EDDB46214B9145E6D504E7211ED355A106B91
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6dd9c253da3a1a0a0b3cd1d403cc7645ad2507ad2f45cbdd06f183e9cf8f9ca9
                          • Instruction ID: e3ff6e57f91c25abf58a198393e755ed0032748059b33a4128df6dde3e846eed
                          • Opcode Fuzzy Hash: 6dd9c253da3a1a0a0b3cd1d403cc7645ad2507ad2f45cbdd06f183e9cf8f9ca9
                          • Instruction Fuzzy Hash: C5D0123154D6C4AFC352C3A8BC654A5BF65DB8222471884EEA48DCB243DA23A907C619
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 35fee4e30f95ca5ceba59d249ced55b672dc21388704afd83a06960270558784
                          • Instruction ID: ad79496e8a014e1d2737f6f90c428c655c175072ba019681d6c1912ec4cfbb50
                          • Opcode Fuzzy Hash: 35fee4e30f95ca5ceba59d249ced55b672dc21388704afd83a06960270558784
                          • Instruction Fuzzy Hash: DCD0A7722252508FD7408F31C8889913BE4AF0111070840C89445CB1A2C924E509EB11
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6b890a1878f21bb7f09d862592a755ed2ce311562f5f1a0304c6abbbdd52873e
                          • Instruction ID: 19d07928bc24b9474f7e59cbdd8b8e0d3deed1c7a519eb3c8c8690cf2c067a2b
                          • Opcode Fuzzy Hash: 6b890a1878f21bb7f09d862592a755ed2ce311562f5f1a0304c6abbbdd52873e
                          • Instruction Fuzzy Hash: C5C092303082084B8748D69DE851825F3DA9BCC618328C0BDA80DC7352EE23FC038684
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397647986.0000000004C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4c10000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 418804ba49e1aebc8fa1d3dc0919575ec75d589b23f2178018c5335086f87319
                          • Instruction ID: 9c1d638d28ae4b7c3dd7acd5f35345a8f978fe62c4878920a0d217ca8927f91a
                          • Opcode Fuzzy Hash: 418804ba49e1aebc8fa1d3dc0919575ec75d589b23f2178018c5335086f87319
                          • Instruction Fuzzy Hash: B2B01230260208CFC200DB5DD444C0033FCBF49E0434000D0F1088B731C721FC008A40
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8f6e4680d30472b736ea8adc8943129eb80ece3ff18c2edf744459092f932474
                          • Instruction ID: 62b51b1a31a290bdad258d1890e71e984fbf409750919396bd88e78be0687923
                          • Opcode Fuzzy Hash: 8f6e4680d30472b736ea8adc8943129eb80ece3ff18c2edf744459092f932474
                          • Instruction Fuzzy Hash: 96A0123408C1545A8B01436468A84CD3F144800006700018DD44B928D2C29540014D01
                          Memory Dump Source
                          • Source File: 00000007.00000002.3397502183.0000000004AE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AE0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_7_2_4ae0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a7b14d2e45c975b37e0323e001875a7f6510144c1c2965297e3bb5ed092ef01b
                          • Instruction ID: 7e050472360938abc8523af400de70957ee1610b76f91f74b6cad915fdc62487
                          • Opcode Fuzzy Hash: a7b14d2e45c975b37e0323e001875a7f6510144c1c2965297e3bb5ed092ef01b
                          • Instruction Fuzzy Hash: 7B90027105860C8B45402795B91D555775C9544517BC00095E50E519915A9D64105996

                          Execution Graph

                          Execution Coverage:5.7%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:11
                          Total number of Limit Nodes:0
                          execution_graph 9719 2f3d5b0 9720 2f3d5f0 FindCloseChangeNotification 9719->9720 9722 2f3d621 9720->9722 9723 2f35208 9725 2f35211 9723->9725 9726 2f36b87 9723->9726 9729 2f3d330 9726->9729 9731 2f3d343 9729->9731 9733 2f3d3e0 9731->9733 9734 2f3d428 VirtualProtect 9733->9734 9736 2f36b9d 9734->9736

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 56219e8-5621a1a 2 5621a20-5621a34 0->2 3 5621e2f-5621e4d 0->3 4 5621a36 2->4 5 5621a3b-5621af2 2->5 8 5622267-5622273 3->8 4->5 49 5621d71-5621d95 5->49 50 5621af8-5621b00 5->50 9 5621e5b-5621e67 8->9 10 5622279-562228d 8->10 13 5622254-5622259 9->13 14 5621e6d-5621eed 9->14 19 5622264 13->19 31 5621f05-5621f1e 14->31 32 5621eef-5621ef5 14->32 19->8 37 5621f20-5621f56 31->37 38 5621f5b-5621f99 31->38 34 5621ef7 32->34 35 5621ef9-5621efb 32->35 34->31 35->31 37->19 55 5621f9b-5621fbc 38->55 56 5621fbe-5621fcb 38->56 60 5621e19-5621e1f 49->60 52 5621b02-5621b06 50->52 53 5621b07-5621b0f 50->53 52->53 57 5621b11 53->57 58 5621b14-5621b36 53->58 68 5621fd2-5621fd8 55->68 56->68 57->58 66 5621b3b-5621b41 58->66 67 5621b38 58->67 61 5621e21 60->61 62 5621e2c 60->62 61->62 62->3 70 5621b47-5621b61 66->70 71 5621cfb-5621d06 66->71 67->66 72 5621ff7-5622049 68->72 73 5621fda-5621ff5 68->73 76 5621b63-5621b67 70->76 77 5621ba1-5621baa 70->77 74 5621d0b-5621d41 71->74 75 5621d08 71->75 112 5622164-56221a3 72->112 113 562204f-5622054 72->113 73->72 114 5621d43-5621d67 74->114 115 5621d69 74->115 75->74 76->77 81 5621b69-5621b71 76->81 78 5621bb0-5621bc0 77->78 79 5621e14 77->79 78->79 85 5621bc6-5621bd7 78->85 79->60 82 5621b77 81->82 83 5621bfa-5621c93 81->83 88 5621b7a-5621b7c 82->88 98 5621d9a-5621dae 83->98 99 5621c99-5621c9d 83->99 85->79 89 5621bdd-5621bed 85->89 90 5621b81-5621b8c 88->90 91 5621b7e 88->91 89->79 93 5621bf3-5621bf8 89->93 90->79 97 5621b92-5621b9d 90->97 91->90 93->83 97->88 100 5621b9f 97->100 98->79 103 5621db0-5621dca 98->103 99->98 104 5621ca3-5621cb1 99->104 100->83 103->79 107 5621dcc-5621de9 103->107 105 5621cb3 104->105 106 5621cf1-5621cf5 104->106 110 5621cb9-5621cbb 105->110 106->70 106->71 107->79 109 5621deb-5621e09 107->109 109->79 116 5621e0b 109->116 117 5621cc5-5621ce1 110->117 118 5621cbd-5621cc1 110->118 132 56221a5-56221bd 112->132 133 56221bf-56221ce 112->133 120 562205e-5622061 113->120 114->115 115->49 116->79 117->79 119 5621ce7-5621cef 117->119 118->117 119->106 119->110 123 5622067 120->123 124 562212c-5622154 120->124 125 56220d0-56220fc 123->125 126 562206e-562209a 123->126 127 56220fe-562212a 123->127 128 562209f-56220cb 123->128 131 562215a-562215e 124->131 125->131 126->131 127->131 128->131 131->112 131->120 137 56221d7-5622239 132->137 133->137 142 5622244-5622252 137->142 142->19
                          Strings
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'cq$TJhq$Tecq$pgq$xbfq
                          • API String ID: 0-2309367897
                          • Opcode ID: 00962169c41e29437bea97154a55fd03faa4d2b9c29852c467176bb0b81139f8
                          • Instruction ID: 2b47c6c218a6fb1edb7648abd6d8f17dc515c90ca7dee5cbd15500bdbd1b5e44
                          • Opcode Fuzzy Hash: 00962169c41e29437bea97154a55fd03faa4d2b9c29852c467176bb0b81139f8
                          • Instruction Fuzzy Hash: BB522475A045249FCB15CF68C984EA9BBB2FF89304F1581A8E51AAB372CB35EC51CF50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 517 55f5d28-55f5d8e 519 55f5dd8-55f5dda 517->519 520 55f5d90-55f5d9b 517->520 522 55f5ddc-55f5e34 519->522 520->519 521 55f5d9d-55f5da9 520->521 523 55f5dcc-55f5dd6 521->523 524 55f5dab-55f5db5 521->524 531 55f5e7e-55f5e80 522->531 532 55f5e36-55f5e41 522->532 523->522 525 55f5db9-55f5dc8 524->525 526 55f5db7 524->526 525->525 528 55f5dca 525->528 526->525 528->523 533 55f5e82-55f5e9a 531->533 532->531 534 55f5e43-55f5e4f 532->534 541 55f5e9c-55f5ea7 533->541 542 55f5ee4-55f5ee6 533->542 535 55f5e72-55f5e7c 534->535 536 55f5e51-55f5e5b 534->536 535->533 537 55f5e5f-55f5e6e 536->537 538 55f5e5d 536->538 537->537 540 55f5e70 537->540 538->537 540->535 541->542 544 55f5ea9-55f5eb5 541->544 543 55f5ee8-55f5f36 542->543 552 55f5f3c-55f5f4a 543->552 545 55f5ed8-55f5ee2 544->545 546 55f5eb7-55f5ec1 544->546 545->543 548 55f5ec5-55f5ed4 546->548 549 55f5ec3 546->549 548->548 550 55f5ed6 548->550 549->548 550->545 553 55f5f4c-55f5f52 552->553 554 55f5f53-55f5fb3 552->554 553->554 561 55f5fb5-55f5fb9 554->561 562 55f5fc3-55f5fc7 554->562 561->562 563 55f5fbb 561->563 564 55f5fc9-55f5fcd 562->564 565 55f5fd7-55f5fdb 562->565 563->562 564->565 566 55f5fcf 564->566 567 55f5fdd-55f5fe1 565->567 568 55f5feb-55f5fef 565->568 566->565 567->568 569 55f5fe3 567->569 570 55f5fff-55f6003 568->570 571 55f5ff1-55f5ff5 568->571 569->568 573 55f6005-55f6009 570->573 574 55f6013-55f6017 570->574 571->570 572 55f5ff7 571->572 572->570 573->574 575 55f600b 573->575 576 55f6019-55f601d 574->576 577 55f6027 574->577 575->574 576->577 578 55f601f 576->578 579 55f6028 577->579 578->577 579->579
                          Strings
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: \VNl
                          • API String ID: 0-3796923132
                          • Opcode ID: 32df7840e71f0a4358ff6c34819c876024b50680a1307d45aa0a6435a09f26cc
                          • Instruction ID: 4bbc48f81c2983800f650920778faa0b7eba3a38f9e39ad6e6869dbdd3fb00ac
                          • Opcode Fuzzy Hash: 32df7840e71f0a4358ff6c34819c876024b50680a1307d45aa0a6435a09f26cc
                          • Instruction Fuzzy Hash: 5B9160B0E042099FDF20CFA9C985BDDBBF2BF48314F148129E519E7254EB749945CB81

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 738 5620d90-5620da0 849 5620da2 call 56236c8 738->849 850 5620da2 call 56236d8 738->850 740 5620da8-5620e22 745 5620ee7-5620f20 740->745 746 5620e28-5620ede 740->746 751 5620f26-5620f49 745->751 752 5621024-56210b3 745->752 746->745 778 5620ee0 746->778 760 5621010-5621019 751->760 780 5621147-5621181 752->780 781 56210b9-5621145 752->781 762 5620f66-5620f6f 760->762 763 562101f 760->763 765 5620f75-5620fc2 762->765 766 562192b-562193b 762->766 767 5621273-56212b7 763->767 765->766 779 5620fc8-562100a 765->779 788 56214ac-56214b2 767->788 789 56212bd-56212de 767->789 778->745 811 562100f 779->811 812 562100c 779->812 796 5621188-5621193 780->796 781->796 851 56214b4 call 56238e0 788->851 852 56214b4 call 56238d0 788->852 798 5621493-56214a6 789->798 799 56212e4 789->799 792 56214ba-56214dd 792->766 796->767 801 5621199-56211a2 796->801 798->788 798->789 802 5621460-562148c 799->802 803 5621411-5621444 799->803 804 5621446-5621452 799->804 805 5621345-5621386 799->805 806 56212eb-56212f7 799->806 807 562138b-56213d4 799->807 808 5621308-5621340 799->808 809 56213d9-562140c 799->809 801->766 813 56211a8-56211ea 801->813 802->798 803->798 804->766 815 5621458-562145e 804->815 805->798 806->766 814 56212fd-5621303 806->814 807->798 808->798 809->798 811->760 812->811 841 562122a-5621242 813->841 842 56211ec-5621204 813->842 814->798 815->798 841->766 844 5621248-5621258 841->844 842->766 843 562120a-5621228 842->843 847 5621263-562126d 843->847 844->847 847->767 847->801 849->740 850->740 851->792 852->792
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b09067e4d87f7175346e7755fab787aa4c3b7912166c83a9786a2a3d08e112bb
                          • Instruction ID: bbf183cc1abbbea2d23cda6c568d04ec0a77c55054a2d2f5fbce58902e8b92fa
                          • Opcode Fuzzy Hash: b09067e4d87f7175346e7755fab787aa4c3b7912166c83a9786a2a3d08e112bb
                          • Instruction Fuzzy Hash: FB123D74A042299FCB54DF29C898A99B7F2FF89300F1185EAD449A7365DF34AD81CF41

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 853 55f6940-55f69a6 855 55f69a8-55f69b3 853->855 856 55f69f0-55f69f2 853->856 855->856 857 55f69b5-55f69c1 855->857 858 55f69f4-55f6a0d 856->858 859 55f69e4-55f69ee 857->859 860 55f69c3-55f69cd 857->860 865 55f6a0f-55f6a1b 858->865 866 55f6a59-55f6a5b 858->866 859->858 861 55f69cf 860->861 862 55f69d1-55f69e0 860->862 861->862 862->862 864 55f69e2 862->864 864->859 865->866 868 55f6a1d-55f6a29 865->868 867 55f6a5d-55f6a75 866->867 874 55f6abf-55f6ac1 867->874 875 55f6a77-55f6a82 867->875 869 55f6a4c-55f6a57 868->869 870 55f6a2b-55f6a35 868->870 869->867 872 55f6a39-55f6a48 870->872 873 55f6a37 870->873 872->872 876 55f6a4a 872->876 873->872 878 55f6ac3-55f6adb 874->878 875->874 877 55f6a84-55f6a90 875->877 876->869 879 55f6ab3-55f6abd 877->879 880 55f6a92-55f6a9c 877->880 884 55f6add-55f6ae8 878->884 885 55f6b25-55f6b27 878->885 879->878 881 55f6a9e 880->881 882 55f6aa0-55f6aaf 880->882 881->882 882->882 886 55f6ab1 882->886 884->885 887 55f6aea-55f6af6 884->887 888 55f6b29-55f6b9c 885->888 886->879 889 55f6b19-55f6b23 887->889 890 55f6af8-55f6b02 887->890 897 55f6ba2-55f6bb0 888->897 889->888 891 55f6b06-55f6b15 890->891 892 55f6b04 890->892 891->891 894 55f6b17 891->894 892->891 894->889 898 55f6bb9-55f6c19 897->898 899 55f6bb2-55f6bb8 897->899 906 55f6c1b-55f6c1f 898->906 907 55f6c29-55f6c2d 898->907 899->898 906->907 910 55f6c21 906->910 908 55f6c2f-55f6c33 907->908 909 55f6c3d-55f6c41 907->909 908->909 911 55f6c35 908->911 912 55f6c43-55f6c47 909->912 913 55f6c51-55f6c55 909->913 910->907 911->909 912->913 914 55f6c49 912->914 915 55f6c57-55f6c5b 913->915 916 55f6c65-55f6c69 913->916 914->913 915->916 917 55f6c5d 915->917 918 55f6c6b-55f6c6f 916->918 919 55f6c79-55f6c7d 916->919 917->916 918->919 922 55f6c71 918->922 920 55f6c7f-55f6c83 919->920 921 55f6c8d 919->921 920->921 923 55f6c85 920->923 924 55f6c8e 921->924 922->919 923->921 924->924
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5639eec36b0faaa1cc0e2b5ec8b41369533c525e1196b665eb670ceb0704e9ad
                          • Instruction ID: 07245be0d6849355a72a5899fd590d724c4f663273a65c19f21f361ea6a51bd0
                          • Opcode Fuzzy Hash: 5639eec36b0faaa1cc0e2b5ec8b41369533c525e1196b665eb670ceb0704e9ad
                          • Instruction Fuzzy Hash: 80B18C70E04209DFDB10CFA9C985BADBBF2FF88314F248129D959AB254EB749845CB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 144 5620040-56200a3 147 56200b2-56200be 144->147 148 56200a5 144->148 149 56200c4-56200c9 147->149 150 5620bef 147->150 366 56200ac call 5622702 148->366 367 56200ac call 562271b 148->367 151 56200cb-56200d4 149->151 152 56200fc-5620141 149->152 153 5620bf4-5620bf8 150->153 151->150 154 56200da-56200f7 151->154 152->150 170 5620147-56202bb 152->170 156 5620bfa 153->156 157 5620bab-5620bc2 153->157 158 5620d60-5620d66 154->158 161 5620c23-5620c6a 156->161 162 5620c01-5620c1e 156->162 163 5620cb8-5620cfc 156->163 164 5620cfe-5620d24 156->164 165 5620c6f-5620cb3 156->165 186 5620bcd-5620be4 157->186 159 5620d68-5620d84 158->159 160 5620d8d 158->160 159->160 172 5620d8e 160->172 185 5620d53-5620d5b 161->185 162->185 163->185 183 5620d26-5620d3d 164->183 184 5620d4d 164->184 165->185 214 56202c1-56202cd 170->214 215 5620826-5620857 170->215 172->172 183->150 194 5620d43-5620d4b 183->194 184->185 185->158 186->150 194->183 194->184 214->150 216 56202d3-562035d 214->216 223 5620859-5620885 215->223 224 56208bc-56208ed 215->224 250 5620385-56203d4 216->250 251 562035f-5620383 216->251 234 5620887-562088a 223->234 235 562089f-56208ba 223->235 236 56208f3-5620990 224->236 237 5620a0f-5620a57 224->237 234->235 238 562088c-562089c 234->238 235->223 235->224 283 56209d2-56209d5 236->283 284 5620992-56209d0 236->284 243 5620ab4-5620af8 237->243 244 5620a59-5620aae 237->244 238->235 264 5620b84-5620ba6 243->264 265 5620afe-5620b43 243->265 244->243 272 56203e0-562041d 250->272 273 56203d6-56203db 250->273 251->250 264->158 265->186 286 5620b49-5620b51 265->286 288 5620429-5620465 272->288 289 562041f-5620424 272->289 274 562080e-5620820 273->274 274->214 274->215 290 56209d7-56209e6 283->290 291 56209e8 283->291 294 56209f4-5620a09 284->294 286->150 287 5620b57-5620b5e 286->287 287->153 292 5620b64-5620b7e 287->292 304 5620471-56204b4 288->304 305 5620467-562046c 288->305 289->274 290->294 291->294 292->264 292->265 294->236 294->237 309 56204c0-5620503 304->309 310 56204b6-56204bb 304->310 305->274 314 5620505-562050a 309->314 315 562050f-5620552 309->315 310->274 314->274 319 5620554-5620559 315->319 320 562055e-56205a1 315->320 319->274 324 56205a3-56205a8 320->324 325 56205ad-56205e3 320->325 324->274 329 56205e5-56205ea 325->329 330 56205ef-562062c 325->330 329->274 334 5620638-562067b 330->334 335 562062e-5620633 330->335 339 5620687-56206ca 334->339 340 562067d-5620682 334->340 335->274 344 56206d6-5620719 339->344 345 56206cc-56206d1 339->345 340->274 349 5620725-5620768 344->349 350 562071b-5620720 344->350 345->274 354 5620774-56207b7 349->354 355 562076a-562076f 349->355 350->274 359 56207c0-5620803 354->359 360 56207b9-56207be 354->360 355->274 364 5620805-562080a 359->364 365 562080c 359->365 360->274 364->274 365->274 366->147 367->147
                          Strings
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: 2$$cq
                          • API String ID: 0-1429447105
                          • Opcode ID: de66338f2fd576377dde60aee08ec1ffa2968e1746a55cb7198c1bcb38711b58
                          • Instruction ID: 318a97ed77caeb61d136ef171f3ba31c69129bfaa9e703beb699d35aee175c24
                          • Opcode Fuzzy Hash: de66338f2fd576377dde60aee08ec1ffa2968e1746a55cb7198c1bcb38711b58
                          • Instruction Fuzzy Hash: 9C722A74A006198FCB54DF65D898AAEBBF2FB88300F1085AAD40AE7355DF389D85CF51

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 368 2f3d3e0-2f3d461 VirtualProtect 371 2f3d463-2f3d469 368->371 372 2f3d46a-2f3d48f 368->372 371->372
                          APIs
                          • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02F3D454
                          Memory Dump Source
                          • Source File: 00000008.00000002.3468598634.0000000002F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_2f30000_InstallUtil.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 790cde62693760b3f1e5503358f5685f58749c645ccddb17b289d0184e79d166
                          • Instruction ID: eade8960ac9762875def07c68a0b55349a022218863a5f3f16b3d98ad574402d
                          • Opcode Fuzzy Hash: 790cde62693760b3f1e5503358f5685f58749c645ccddb17b289d0184e79d166
                          • Instruction Fuzzy Hash: BE110871D002499FDB10DFAAC984ADEFBF5FF58320F14842AD519A7240CB75A945CFA1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 376 2f3d5b0-2f3d61f FindCloseChangeNotification 379 2f3d621-2f3d627 376->379 380 2f3d628-2f3d64d 376->380 379->380
                          APIs
                          • FindCloseChangeNotification.KERNELBASE ref: 02F3D612
                          Memory Dump Source
                          • Source File: 00000008.00000002.3468598634.0000000002F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_2f30000_InstallUtil.jbxd
                          Similarity
                          • API ID: ChangeCloseFindNotification
                          • String ID:
                          • API String ID: 2591292051-0
                          • Opcode ID: 7e788c6a5b931246e63ded0e42d7bbf680067e23f93909f068139281c458859d
                          • Instruction ID: 1d2db7cc7dd5a0d4ebff787474c8897d1bc2dd9bc11c13a9fe8a12390eee81c6
                          • Opcode Fuzzy Hash: 7e788c6a5b931246e63ded0e42d7bbf680067e23f93909f068139281c458859d
                          • Instruction Fuzzy Hash: 7F113AB1D002498FDB20DFAAC8457DEFBF8EF88324F148419D519A7240CB756944CFA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 384 55f0c62-55f0c95 385 55f0cfe-55f0d05 384->385 386 55f0c97-55f0cf5 384->386 387 55f0d0b-55f0d72 385->387 388 55f0de6-55f0df7 385->388 449 55f0cf8 call 55f0fc8 386->449 450 55f0cf8 call 55f0fb8 386->450 451 55f0cf8 call 55f0c62 386->451 452 55f0cf8 call 55f0f30 386->452 422 55f0d74-55f0db3 387->422 423 55f0de0 387->423 389 55f0dfe-55f0e21 388->389 390 55f0df9 388->390 398 55f0e93-55f0f2e 389->398 399 55f0e23-55f0e2c 389->399 390->389 414 55f0f4f-55f0f55 398->414 402 55f0e2e-55f0e33 399->402 403 55f0e3b-55f0e41 399->403 402->403 405 55f0f4a 403->405 406 55f0e47-55f0e4e 403->406 405->414 406->398 409 55f0e50-55f0e59 406->409 411 55f0e5b-55f0e60 409->411 412 55f0e68-55f0e6e 409->412 411->412 412->405 416 55f0e74-55f0e8e 412->416 417 55f0f5f 414->417 418 55f0f57 414->418 416->414 421 55f0f96-55f100d call 2f3e120 417->421 418->417 448 55f1012-55f1016 421->448 439 55f0dd6-55f0dda 422->439 440 55f0db5-55f0dc5 422->440 423->388 439->421 439->423 444 55f0dc7-55f0dce 440->444 445 55f0dd0-55f0dd4 440->445 444->439 445->439 445->440 449->385 450->385 451->385 452->385
                          Strings
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: Djq
                          • API String ID: 0-3204991199
                          • Opcode ID: 77423a17051d3d51b9ac95d5dbce80d25481d0f2cd8f1111137246256bb0da9b
                          • Instruction ID: c8c9177d967525d577ac483ca59c69fab7a589a0cfb998f307d6b36f3966e14d
                          • Opcode Fuzzy Hash: 77423a17051d3d51b9ac95d5dbce80d25481d0f2cd8f1111137246256bb0da9b
                          • Instruction Fuzzy Hash: EAA19E74B006049FC754DF29D894A6ABBF2FF88310F558069E50AEB3A2DB34EC41CB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 580 55f5d1c-55f5d8e 582 55f5dd8-55f5dda 580->582 583 55f5d90-55f5d9b 580->583 585 55f5ddc-55f5e34 582->585 583->582 584 55f5d9d-55f5da9 583->584 586 55f5dcc-55f5dd6 584->586 587 55f5dab-55f5db5 584->587 594 55f5e7e-55f5e80 585->594 595 55f5e36-55f5e41 585->595 586->585 588 55f5db9-55f5dc8 587->588 589 55f5db7 587->589 588->588 591 55f5dca 588->591 589->588 591->586 596 55f5e82-55f5e9a 594->596 595->594 597 55f5e43-55f5e4f 595->597 604 55f5e9c-55f5ea7 596->604 605 55f5ee4-55f5ee6 596->605 598 55f5e72-55f5e7c 597->598 599 55f5e51-55f5e5b 597->599 598->596 600 55f5e5f-55f5e6e 599->600 601 55f5e5d 599->601 600->600 603 55f5e70 600->603 601->600 603->598 604->605 607 55f5ea9-55f5eb5 604->607 606 55f5ee8-55f5efa 605->606 614 55f5f01-55f5f36 606->614 608 55f5ed8-55f5ee2 607->608 609 55f5eb7-55f5ec1 607->609 608->606 611 55f5ec5-55f5ed4 609->611 612 55f5ec3 609->612 611->611 613 55f5ed6 611->613 612->611 613->608 615 55f5f3c-55f5f4a 614->615 616 55f5f4c-55f5f52 615->616 617 55f5f53-55f5fb3 615->617 616->617 624 55f5fb5-55f5fb9 617->624 625 55f5fc3-55f5fc7 617->625 624->625 626 55f5fbb 624->626 627 55f5fc9-55f5fcd 625->627 628 55f5fd7-55f5fdb 625->628 626->625 627->628 629 55f5fcf 627->629 630 55f5fdd-55f5fe1 628->630 631 55f5feb-55f5fef 628->631 629->628 630->631 632 55f5fe3 630->632 633 55f5fff-55f6003 631->633 634 55f5ff1-55f5ff5 631->634 632->631 636 55f6005-55f6009 633->636 637 55f6013-55f6017 633->637 634->633 635 55f5ff7 634->635 635->633 636->637 638 55f600b 636->638 639 55f6019-55f601d 637->639 640 55f6027 637->640 638->637 639->640 641 55f601f 639->641 642 55f6028 640->642 641->640 642->642
                          Strings
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: \VNl
                          • API String ID: 0-3796923132
                          • Opcode ID: 48fedee9cb22059d1090fdfa4bf88e7fb113bb59e61c86ee316ee3029c825343
                          • Instruction ID: b60ba854ff4afa4901461ed7f960a5592bfdb9b201ca6261ea5c24f69ccf285c
                          • Opcode Fuzzy Hash: 48fedee9cb22059d1090fdfa4bf88e7fb113bb59e61c86ee316ee3029c825343
                          • Instruction Fuzzy Hash: 15916EB0E042099FDF20CFA8D985BDDBBF2BF48314F248129E519E7254EB749945CB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 709 562271b-5622766 736 5622768 call 5622960 709->736 737 5622768 call 562295a 709->737 715 562276e-56227b9 720 56227c5-562288e 715->720 721 56227bb-56227bf 715->721 735 5622896-562289a 720->735 721->720 736->715 737->715
                          Strings
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID: TJhq
                          • API String ID: 0-2449534970
                          • Opcode ID: b3851a2496f4d267e4d6c6e5d8106286bc1aa8063ebb4ce16ec6a04b5e5cf351
                          • Instruction ID: 1acfc44aa2e20485443608a1bcab6928c2bea2565d8c7149799d26d08bb16238
                          • Opcode Fuzzy Hash: b3851a2496f4d267e4d6c6e5d8106286bc1aa8063ebb4ce16ec6a04b5e5cf351
                          • Instruction Fuzzy Hash: 1D31D0397001149BC305AF69E06836F3692FBD9A14F24417EE403AB7A4DF7C9C0A8BD2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 925 55f6934-55f69a6 927 55f69a8-55f69b3 925->927 928 55f69f0-55f69f2 925->928 927->928 929 55f69b5-55f69c1 927->929 930 55f69f4-55f6a0d 928->930 931 55f69e4-55f69ee 929->931 932 55f69c3-55f69cd 929->932 937 55f6a0f-55f6a1b 930->937 938 55f6a59-55f6a5b 930->938 931->930 933 55f69cf 932->933 934 55f69d1-55f69e0 932->934 933->934 934->934 936 55f69e2 934->936 936->931 937->938 940 55f6a1d-55f6a29 937->940 939 55f6a5d-55f6a75 938->939 946 55f6abf-55f6ac1 939->946 947 55f6a77-55f6a82 939->947 941 55f6a4c-55f6a57 940->941 942 55f6a2b-55f6a35 940->942 941->939 944 55f6a39-55f6a48 942->944 945 55f6a37 942->945 944->944 948 55f6a4a 944->948 945->944 950 55f6ac3-55f6adb 946->950 947->946 949 55f6a84-55f6a90 947->949 948->941 951 55f6ab3-55f6abd 949->951 952 55f6a92-55f6a9c 949->952 956 55f6add-55f6ae8 950->956 957 55f6b25-55f6b27 950->957 951->950 953 55f6a9e 952->953 954 55f6aa0-55f6aaf 952->954 953->954 954->954 958 55f6ab1 954->958 956->957 959 55f6aea-55f6af6 956->959 960 55f6b29-55f6b5f 957->960 958->951 961 55f6b19-55f6b23 959->961 962 55f6af8-55f6b02 959->962 968 55f6b67-55f6b9c 960->968 961->960 963 55f6b06-55f6b15 962->963 964 55f6b04 962->964 963->963 966 55f6b17 963->966 964->963 966->961 969 55f6ba2-55f6bb0 968->969 970 55f6bb9-55f6c19 969->970 971 55f6bb2-55f6bb8 969->971 978 55f6c1b-55f6c1f 970->978 979 55f6c29-55f6c2d 970->979 971->970 978->979 982 55f6c21 978->982 980 55f6c2f-55f6c33 979->980 981 55f6c3d-55f6c41 979->981 980->981 983 55f6c35 980->983 984 55f6c43-55f6c47 981->984 985 55f6c51-55f6c55 981->985 982->979 983->981 984->985 986 55f6c49 984->986 987 55f6c57-55f6c5b 985->987 988 55f6c65-55f6c69 985->988 986->985 987->988 989 55f6c5d 987->989 990 55f6c6b-55f6c6f 988->990 991 55f6c79-55f6c7d 988->991 989->988 990->991 994 55f6c71 990->994 992 55f6c7f-55f6c83 991->992 993 55f6c8d 991->993 992->993 995 55f6c85 992->995 996 55f6c8e 993->996 994->991 995->993 996->996
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e53ff3f9e8d6d54ba954d0a485fd362eeb7e7072ee5fca0db3a891b994a7c765
                          • Instruction ID: 3bfe9e7a39ebc70226ea3b35fe36f1071c5717407cbfdb4a6e1987db86c2217b
                          • Opcode Fuzzy Hash: e53ff3f9e8d6d54ba954d0a485fd362eeb7e7072ee5fca0db3a891b994a7c765
                          • Instruction Fuzzy Hash: 4AA17C70E04209DFDB10CFA8D985BADBBF2FF48314F248129D959EB254EB749845CB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 997 562e0e0-562e3b7 999 562e3c3-562e9bc 997->999 1001 562edc8-562edca 999->1001 1002 562edd0-562efcb 1001->1002 1003 562e7f4-562eb72 1001->1003 1002->1003 1006 562e121-562e144 1003->1006 1007 562eb78 1003->1007 1036 562e146-562e182 1006->1036 1037 562e184-562e18d 1006->1037 1008 562ee6a-562ee6d 1007->1008 1009 562ec78-562ec7b 1007->1009 1010 562ea89-562ea8c 1007->1010 1012 562eb23-562eb26 1008->1012 1013 562ee73 1008->1013 1017 562ec81 1009->1017 1018 562f009-562f013 1009->1018 1015 562ea92 1010->1015 1016 562f064-562f067 1010->1016 1022 562e913-562e919 1012->1022 1023 562eb2c-562f01b 1012->1023 1026 562ef49-562ef6e 1013->1026 1015->1012 1020 562ee47-562ee4d 1016->1020 1021 562f06d 1016->1021 1017->1001 1018->1006 1029 562ee5b-562ee5f 1020->1029 1030 562ee4f-562ee51 1020->1030 1035 562f0c9-562f25f 1021->1035 1024 562e927-562e92b 1022->1024 1025 562e91b-562e91d 1022->1025 1034 562f021 1023->1034 1023->1035 1024->1026 1033 562e931-562edff 1024->1033 1025->1024 1054 562e112-562e118 1026->1054 1055 562ef74-562ef79 1026->1055 1038 562ee65 1029->1038 1039 562e34d-562e367 1029->1039 1030->1029 1033->1054 1061 562ee05-562ee0a 1033->1061 1034->1016 1036->1037 1038->1008 1039->1006 1054->1006 1056 562e11a 1054->1056 1055->1054 1056->1006 1060 562e4e2-562e4ec 1056->1060 1060->1006 1061->1054
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 93c70da8127f7b28a74bd3a20c43ec45f4284f1db88cf8fb9244dcbdc0f5b3f8
                          • Instruction ID: 515c970bf750f809e6a5446a86f83502d81f5e3a5a01ac132e9c8427da4f54eb
                          • Opcode Fuzzy Hash: 93c70da8127f7b28a74bd3a20c43ec45f4284f1db88cf8fb9244dcbdc0f5b3f8
                          • Instruction Fuzzy Hash: B6918D74B045289BCB08AFB694586BD7AA7BFA5200F60483ED407AB394DE35AC45CF11
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3071516bf08707d4b86908dcdfbbca012667c77731edb2ee1834006ed64b0a6d
                          • Instruction ID: f656a5731b309e1e82a64edb25567d29c80774fb9737b7723788c0564bcf859b
                          • Opcode Fuzzy Hash: 3071516bf08707d4b86908dcdfbbca012667c77731edb2ee1834006ed64b0a6d
                          • Instruction Fuzzy Hash: 0351F335A04608DFCB00DF64C884AAEBBB2FF45300F1585AAD50AAB361DB35AD05CFC2
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 92d2bece14577faa7d3614a995d21241f7874728c186d14d661de3b803bcf9c2
                          • Instruction ID: f91d953956f816ef68dee26654a572e0ae7035841f11a21499e168b25e45aeea
                          • Opcode Fuzzy Hash: 92d2bece14577faa7d3614a995d21241f7874728c186d14d661de3b803bcf9c2
                          • Instruction Fuzzy Hash: 9841EDB1D00249DFDB10DFA9C884ADEBFF5FF48310F24802AE819AB214DB75A945CB90
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c97a5e20449c8506c9fbc0c2ff07c2066a0eb159cd70ec97997914474ba2cbb6
                          • Instruction ID: 8f8c5fb01e9f29566abc8cd4ab2c71ed5c58d349157cbeb3de0c43f57374b9eb
                          • Opcode Fuzzy Hash: c97a5e20449c8506c9fbc0c2ff07c2066a0eb159cd70ec97997914474ba2cbb6
                          • Instruction Fuzzy Hash: 0F41EDB0D00249DFDB10DFA9C884A9EBFF5FF48310F248429E919AB254DB75A945CB90
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 657c2ca4e0a6b3e6027712112deee4d80b93e4e3fa4dd25091cfddebd00dc554
                          • Instruction ID: 2869983754c8d7ed7be9ab851e52deaf9a5f5c1ecd18c9cc4e2d96daa130cc40
                          • Opcode Fuzzy Hash: 657c2ca4e0a6b3e6027712112deee4d80b93e4e3fa4dd25091cfddebd00dc554
                          • Instruction Fuzzy Hash: EA41EA74A00628CFCB14DF58C894A9DB7B2FF88305F5185EAD909A7355DB349E82CF41
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bc1e8cb79fc063cedf31b86152e194ce5c8a507c63eecc63cc049de82acceecc
                          • Instruction ID: cdcc3d124fba71a42cc0158091752799392649496ec5a8c7f02289f35efb4d46
                          • Opcode Fuzzy Hash: bc1e8cb79fc063cedf31b86152e194ce5c8a507c63eecc63cc049de82acceecc
                          • Instruction Fuzzy Hash: 6731E174A042599FC711CF54D489AAEBFB6FF49300F1440AAE405EB351EB389C44CF92
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 642ce515de32c23e100eebd0e32bf5571db54a545e28843396ea2b1f3d31f7cb
                          • Instruction ID: 370a7525626f4c6810fad636f73dc85cded26db62caa7e0577cb1e4032fc4ce7
                          • Opcode Fuzzy Hash: 642ce515de32c23e100eebd0e32bf5571db54a545e28843396ea2b1f3d31f7cb
                          • Instruction Fuzzy Hash: DA111834A08A25CFDB04CF98D58896CBBB2FB89319B55806AE4169B761DFB0E845CF11
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e039020b5336babbf542abea8f0e056c770a67be74eb0c24a692d549b86ef527
                          • Instruction ID: 26bccf72360495cd3a76c00699e40a29aa56dc7db27b6c13c2cdb7cf7cde807e
                          • Opcode Fuzzy Hash: e039020b5336babbf542abea8f0e056c770a67be74eb0c24a692d549b86ef527
                          • Instruction Fuzzy Hash: D4211A78E00219DFC755DF65C894A99BBB2FF89304F1081EAE80AA7364CB359D81CF50
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 91755e68ef1313ca7c055404aad6c87d97b3464dfe8e313b195b18326adc063e
                          • Instruction ID: 843b70c0373c7f86bf183e70c2460222d4879a3344e766a30ce900fbd07a8e0d
                          • Opcode Fuzzy Hash: 91755e68ef1313ca7c055404aad6c87d97b3464dfe8e313b195b18326adc063e
                          • Instruction Fuzzy Hash: 12F0E57230021827E308256B6C96BEBB68EEFC0660F54802FA108CBB95DC75DC4202E5
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bb6a860acdda7fd890a8595d1a89a165df957b0d822f38d52faf71ff8971781b
                          • Instruction ID: 042c80e0fd5dcd620a699440697575c2f130c19f7f2f8970b44e4fd8f4c9322e
                          • Opcode Fuzzy Hash: bb6a860acdda7fd890a8595d1a89a165df957b0d822f38d52faf71ff8971781b
                          • Instruction Fuzzy Hash: 6901AD31A18A918FCB11DB28C185999BFB2FF40300B0689A6D4961B657DB38F847CF86
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0302af8d1a3c4cf61eccbde6f5eef719c2f33fad0d1096a4c73ceb763c122c5b
                          • Instruction ID: 1f852047d796f60738ce8c7f9b4667ab91ff37cececd6d7daa4680684ae4f94d
                          • Opcode Fuzzy Hash: 0302af8d1a3c4cf61eccbde6f5eef719c2f33fad0d1096a4c73ceb763c122c5b
                          • Instruction Fuzzy Hash: 43011A38A082188FDB51DF29C894A9A7BB2FF89204F1441DAD449A73A5DB386D82CF50
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0a048165f72597e352a388c8ac22809d45b198a8a9cd5e0505222c1d1b6cff56
                          • Instruction ID: cb9b09fb99f3c21f90fce710d10feb48a65ad43961e365853d710b3c07edeb77
                          • Opcode Fuzzy Hash: 0a048165f72597e352a388c8ac22809d45b198a8a9cd5e0505222c1d1b6cff56
                          • Instruction Fuzzy Hash: 17F0E9712147010FC21AE77BE8904AF3BBBDFE12103848E6BD1458B6E1DF749D0987A0
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9d8ac0b3fc5bb27106fb128d2a7a99301a2f2eab0efcc8eb20dc022963bd4a54
                          • Instruction ID: 27b67cd010fca82a8f443e18bcad29e761ac1d14d21662a2a75629581471eb63
                          • Opcode Fuzzy Hash: 9d8ac0b3fc5bb27106fb128d2a7a99301a2f2eab0efcc8eb20dc022963bd4a54
                          • Instruction Fuzzy Hash: B7E0126170421827D308296B5C55B6BB98EEFD5650F54802EA609CB395CC759C4102E4
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e492b22f92a9d41bec4b9a97f9d680194c72c1119379e4c28d04639f4d2c7f6b
                          • Instruction ID: 23aee6003ce632250cc4fe03b05d41dd8a30e65145ef0822b0a936a7523cf530
                          • Opcode Fuzzy Hash: e492b22f92a9d41bec4b9a97f9d680194c72c1119379e4c28d04639f4d2c7f6b
                          • Instruction Fuzzy Hash: 32E0A0302007010BC219EA3BE8908AE37AEEED12207848E2ED11546594EF74A84997A0
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f2ae3f7680ecc319476b5637a93f03b54ed3ca62195c5463242cce837a46d807
                          • Instruction ID: e857e4243f510f1ba262402987d7b098a3a26bbcead8cfdad6bcb665f9c1830d
                          • Opcode Fuzzy Hash: f2ae3f7680ecc319476b5637a93f03b54ed3ca62195c5463242cce837a46d807
                          • Instruction Fuzzy Hash: A0F0A478A04218EFDB24CF94C945BADBBB2FF49314F154499E6066B390D371AD81CF62
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 56987b59716fb4be5fdf89f5244b49c743d667d18d66fdba5f7fa2bf77997c3f
                          • Instruction ID: 3a8e80935d57b39f7c4955e4c87e85f6bcb6269cbbc1a45a12bd2c7409ef08f1
                          • Opcode Fuzzy Hash: 56987b59716fb4be5fdf89f5244b49c743d667d18d66fdba5f7fa2bf77997c3f
                          • Instruction Fuzzy Hash: 5BF090B8908524CFCB05CF64C888969BBB1FF49208F1440DED80EAB299DB785E41CF50
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c5f15d984ee86578197ab2e84b82c971b91931882125ce6234ce670db70b0219
                          • Instruction ID: 2092433bea947b76b25f990ebcb9330b0e1822a560b09e6f32e2d591511fc2c9
                          • Opcode Fuzzy Hash: c5f15d984ee86578197ab2e84b82c971b91931882125ce6234ce670db70b0219
                          • Instruction Fuzzy Hash: 20F0B674A00268CFCB54DF24D88469CBBB1FF89315F1081EAD409A7750CB349E85CF41
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 05ad5cc1763c7e33cfa76f48b74975cecffdd649669a4a647edbf09d765c6937
                          • Instruction ID: 64988e4a7b55a817808931696d28e3fcd0e1fe119b43b647f27ec615028eb5c2
                          • Opcode Fuzzy Hash: 05ad5cc1763c7e33cfa76f48b74975cecffdd649669a4a647edbf09d765c6937
                          • Instruction Fuzzy Hash: D9D05E73314010B78510658EE885EABB7EEE7C9A71B80402BF60DC3700DEA0AC0403F5
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f29241989c9ffb2e99fe8c28fba77e5f5d53a906c50b75ca125754ec7deaf8e8
                          • Instruction ID: ca23d79c40e0b1e93cfea35bb1dd61eeb385cfbe81fcd4ae4fea8a35a2763bf2
                          • Opcode Fuzzy Hash: f29241989c9ffb2e99fe8c28fba77e5f5d53a906c50b75ca125754ec7deaf8e8
                          • Instruction Fuzzy Hash: A5D09272314064BB8604659EA844AAAB6EEEBC9A61B80402BF60DC3740DEA1AC0543B5
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f52d11d1c75578eabdef8bde73e8dac545c954edbddf5facba2d755d51a11616
                          • Instruction ID: da340f6db3b535bb004e3627264c7e21767d564a7a08ae7387bd2494db0e8450
                          • Opcode Fuzzy Hash: f52d11d1c75578eabdef8bde73e8dac545c954edbddf5facba2d755d51a11616
                          • Instruction Fuzzy Hash: BBE0EC72801508AFCB01DFE5D90568E77F9FF45206F9049E99504D7211FF318A109B81
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e213d6044e4dfb359ca72f56a6983ab2caf29e523527396834833df3c0ea1cce
                          • Instruction ID: 3d17ef0693a85aa0a28cd1a3abf072406b6161ebe3d43a28ce95580eb418260a
                          • Opcode Fuzzy Hash: e213d6044e4dfb359ca72f56a6983ab2caf29e523527396834833df3c0ea1cce
                          • Instruction Fuzzy Hash: 1EE0C231E0D645DFC381CAA09A0706DBF726E812117148AE7DC09AA600F73D1A1ADB40
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3f3e047881d69171bba196ece7ae5499a9883b7e03be2e3ed8ebd0a07a91a79d
                          • Instruction ID: 9b364fc6f5b69da7a8eb4aacac494cfb2013f15b2777ca1a2501857eeb002522
                          • Opcode Fuzzy Hash: 3f3e047881d69171bba196ece7ae5499a9883b7e03be2e3ed8ebd0a07a91a79d
                          • Instruction Fuzzy Hash: 11D0123331450407D684C15CEC837E5F3C5D788624F18C06AA40CC3B91E922FD034589
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ed1e798480f0f39d9e4d1ba8f9005dec8ac6d9fe13267effddc7a8a4fc0ec62d
                          • Instruction ID: 7efb2ab305e9259c0294ca5486425bb3cd798c49102fb9bdbf3f998cdd645d2b
                          • Opcode Fuzzy Hash: ed1e798480f0f39d9e4d1ba8f9005dec8ac6d9fe13267effddc7a8a4fc0ec62d
                          • Instruction Fuzzy Hash: C7D0C972D0520CABCB01EFF4C90189EBBFDEB4A210B9049EAD904E7211ED319B109FD1
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e7fcb3c62aa90ee8e2a9e3a39cba6b4d25c453117529eb450d6a69d2b3346df1
                          • Instruction ID: 63e1e6f889cfb835e9f693c7103443de9c270baceed03692892599acee747a25
                          • Opcode Fuzzy Hash: e7fcb3c62aa90ee8e2a9e3a39cba6b4d25c453117529eb450d6a69d2b3346df1
                          • Instruction Fuzzy Hash: B4D05E72C0120CAFCB01EFE0880048E7BF9EF49200B9004A59904D3210FE318A009B81
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: be965ba0c20c2ce8b3af885015a8ccd6012e20a024c9b77a74bf48aac72bf2bd
                          • Instruction ID: 7bb36b2c1d24505b367f58c3000598df4debd2a756134fe70230e2a6af896eb5
                          • Opcode Fuzzy Hash: be965ba0c20c2ce8b3af885015a8ccd6012e20a024c9b77a74bf48aac72bf2bd
                          • Instruction Fuzzy Hash: D4D0A730E1C708EB8780CEA5C80605DBBBBAA40100750C9A1E80A97600F7390A02DA50
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0d74c01bb4ad1d68281edae625f8d4c18cf409a9308f86830ff047ccf59850ce
                          • Instruction ID: 18b1a06f6716af7b76035ed0014b9eacd6e000d603f70c5d06368fb5fa20043b
                          • Opcode Fuzzy Hash: 0d74c01bb4ad1d68281edae625f8d4c18cf409a9308f86830ff047ccf59850ce
                          • Instruction Fuzzy Hash: 72D0229E20DE79D6C610C6C4B821B622B8CEB001BAF000437C145A1901C23C8049CB52
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b4661849ba5510acf1ff0ab69006f2f16e7dae806819159634f40b59050b727b
                          • Instruction ID: 52c5a298db54e8664b4d051296bdbf00f8cb89ea2492895f39f488a800b1ed3a
                          • Opcode Fuzzy Hash: b4661849ba5510acf1ff0ab69006f2f16e7dae806819159634f40b59050b727b
                          • Instruction Fuzzy Hash: F0D0C973E051089ACB41EBF4CB0259D77F5EF8A2107A04AFBC508E7610ED358B109F81
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 30812b6a035c9ba299370db8626ccccf06e268cbb8f8e0817226f6ddc267808e
                          • Instruction ID: bcd63a0d635e4d83207b7053a8ae1d48d1fa2033e18cda286ca713fcf9cef43d
                          • Opcode Fuzzy Hash: 30812b6a035c9ba299370db8626ccccf06e268cbb8f8e0817226f6ddc267808e
                          • Instruction Fuzzy Hash: 17C012315041084BD345DA98E443B55FB9CEB80204F18C1BDD44DC7652CA32DC128685
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2645de9c9e4678c39fa2d79db68f298b3293117482a784e341fff89ba84b62ec
                          • Instruction ID: 2b72b62b962492a05815df1baa584b9a8a8ebfb0f11a06f538049e7aef242d44
                          • Opcode Fuzzy Hash: 2645de9c9e4678c39fa2d79db68f298b3293117482a784e341fff89ba84b62ec
                          • Instruction Fuzzy Hash: A3C040375611049FD7509559D886FD533FDFF45A15F950495E10587F31F611FC0045C6
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2b26bc7ee981d9d3906d4f66f9da7e2804fead16dd028382140c7835791ee313
                          • Instruction ID: 0c14a102102ca89d9bfee992ca4dea00555ff8e734f4ff99dcd65b6ba5fada11
                          • Opcode Fuzzy Hash: 2b26bc7ee981d9d3906d4f66f9da7e2804fead16dd028382140c7835791ee313
                          • Instruction Fuzzy Hash: EBD012736252218FD704CF31D988A943BE4AF15520B0D84D5E04ACB2A2CA3CD915DF11
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6b890a1878f21bb7f09d862592a755ed2ce311562f5f1a0304c6abbbdd52873e
                          • Instruction ID: 19d07928bc24b9474f7e59cbdd8b8e0d3deed1c7a519eb3c8c8690cf2c067a2b
                          • Opcode Fuzzy Hash: 6b890a1878f21bb7f09d862592a755ed2ce311562f5f1a0304c6abbbdd52873e
                          • Instruction Fuzzy Hash: C5C092303082084B8748D69DE851825F3DA9BCC618328C0BDA80DC7352EE23FC038684
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0641a3f66b024de38468e216bce3554738dc41371ddaebbfadce7a24cd4ce48d
                          • Instruction ID: b422e0b11c346684bb78d6fc3d7924c3c79347c004841014578ea44bc49e4936
                          • Opcode Fuzzy Hash: 0641a3f66b024de38468e216bce3554738dc41371ddaebbfadce7a24cd4ce48d
                          • Instruction Fuzzy Hash: 49B0127305060C8FE7D01280FC8FBE2334DD754A0BFC40052A10C93AA1F62E90144585
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4bbeb43e145a7cdc43c2be2af92a8458ed241069f25b76ece40ace66767ea675
                          • Instruction ID: 84585217ae5820a4671a756b8839317b9e612af6ca352045601a79121e655cb1
                          • Opcode Fuzzy Hash: 4bbeb43e145a7cdc43c2be2af92a8458ed241069f25b76ece40ace66767ea675
                          • Instruction Fuzzy Hash: 2FC092316481189B8644DBD8E842C18B7A9EB88A18354C4AEF90C8B602EF33EC0786C4
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472195351.0000000005620000.00000040.00000800.00020000.00000000.sdmp, Offset: 05620000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_5620000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction ID: 6946c9798f7289baa91495e0fb5539b78174b0423724991b48b9fdfa7c9b4558
                          • Opcode Fuzzy Hash: b07eb51126463de2bf8462432d69fd4c92e1a2acd6486d465ab4ae050f38ce89
                          • Instruction Fuzzy Hash: 02B012302081084F8244D6D8E841C14F39DDBC4618354C0ADE80CCB302CF33FC0385C4
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 418804ba49e1aebc8fa1d3dc0919575ec75d589b23f2178018c5335086f87319
                          • Instruction ID: 9c1d638d28ae4b7c3dd7acd5f35345a8f978fe62c4878920a0d217ca8927f91a
                          • Opcode Fuzzy Hash: 418804ba49e1aebc8fa1d3dc0919575ec75d589b23f2178018c5335086f87319
                          • Instruction Fuzzy Hash: B2B01230260208CFC200DB5DD444C0033FCBF49E0434000D0F1088B731C721FC008A40
                          Memory Dump Source
                          • Source File: 00000008.00000002.3472091578.00000000055F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 055F0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_8_2_55f0000_InstallUtil.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d205561aeb2c5cb41374aea9f17aec14fcf58cbd8e415c36f8c6fde73c6bfe3a
                          • Instruction ID: 7dddf7c07193b8a46404c683e1f797546a2fd5e4aad1d055c41a863993aad0d1
                          • Opcode Fuzzy Hash: d205561aeb2c5cb41374aea9f17aec14fcf58cbd8e415c36f8c6fde73c6bfe3a
                          • Instruction Fuzzy Hash: F490027104460C8F45902795B50D555775D964451B7D00091A50D425556A5964114695